<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.1 20151215//EN" "http://jats.nlm.nih.gov/publishing/1.1/JATS-journalpublishing1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:mml="http://www.w3.org/1998/Math/MathML" xml:lang="en" article-type="research-article" dtd-version="1.1">
<front>
<journal-meta>
<journal-id journal-id-type="pmc">CMES</journal-id>
<journal-id journal-id-type="nlm-ta">CMES</journal-id>
<journal-id journal-id-type="publisher-id">CMES</journal-id>
<journal-title-group>
<journal-title>Computer Modeling in Engineering &#x0026; Sciences</journal-title>
</journal-title-group>
<issn pub-type="epub">1526-1506</issn>
<issn pub-type="ppub">1526-1492</issn>
<publisher>
<publisher-name>Tech Science Press</publisher-name>
<publisher-loc>USA</publisher-loc>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="publisher-id">61472</article-id>
<article-id pub-id-type="doi">10.32604/cmes.2025.061472</article-id>
<article-categories>
<subj-group subj-group-type="heading">
<subject>Article</subject>
</subj-group>
</article-categories>
<title-group>
<article-title>ANNDRA-IoT: A Deep Learning Approach for Optimal Resource Allocation in Internet of Things Environments</article-title>
<alt-title alt-title-type="left-running-head">ANNDRA-IoT: A Deep Learning Approach for Optimal Resource Allocation in Internet of Things Environments</alt-title>
<alt-title alt-title-type="right-running-head">ANNDRA-IoT: A Deep Learning Approach for Optimal Resource Allocation in Internet of Things Environments</alt-title>
</title-group>
<contrib-group>
<contrib id="author-1" contrib-type="author" corresp="yes">
<name name-style="western"><surname>Alqahtani</surname><given-names>Abdullah M.</given-names></name><xref ref-type="aff" rid="aff-1">1</xref><email>Amqahtani@jazanu.edu.sa</email></contrib>
<contrib id="author-2" contrib-type="author">
<name name-style="western"><surname>Awan</surname><given-names>Kamran Ahmad</given-names></name><xref ref-type="aff" rid="aff-2">2</xref></contrib>
<contrib id="author-3" contrib-type="author">
<name name-style="western"><surname>Almaleh</surname><given-names>Abdulaziz</given-names></name><xref ref-type="aff" rid="aff-3">3</xref></contrib>
<contrib id="author-4" contrib-type="author">
<name name-style="western"><surname>Aletri</surname><given-names>Osama</given-names></name><xref ref-type="aff" rid="aff-4">4</xref></contrib>
<aff id="aff-1"><label>1</label><institution>Department of Electrical and Electronic Engineering, College of Engineering and Computer Science, Jazan University</institution>, <addr-line>Jazan, 45142</addr-line>, <country>Saudi Arabia</country></aff>
<aff id="aff-2"><label>2</label><institution>Department of Information Technology, The University of Haripur</institution>, <addr-line>Haripur, 22620</addr-line>, <country>Pakistan</country></aff>
<aff id="aff-3"><label>3</label><institution>College of Computer Science, King Khalid University</institution>, <addr-line>Abha, 62529</addr-line>, <country>Saudi Arabia</country></aff>
<aff id="aff-4"><label>4</label><institution>Department of Computing, College of Engineering and Computing, Umm Al-Qura University</institution>, <addr-line>Makkah, 21955</addr-line>, <country>Saudi Arabia</country></aff>
</contrib-group>
<author-notes>
<corresp id="cor1"><label>&#x002A;</label>Corresponding Author: Abdullah M. Alqahtani. Email: <email>amqahtani@jazanu.edu.sa</email></corresp>
</author-notes>
<pub-date date-type="collection" publication-format="electronic">
<year>2025</year>
</pub-date>
<pub-date date-type="pub" publication-format="electronic">
<day>03</day><month>03</month><year>2025</year>
</pub-date>
<volume>142</volume>
<issue>3</issue>
<fpage>3155</fpage>
<lpage>3179</lpage>
<history>
<date date-type="received">
<day>25</day>
<month>11</month>
<year>2024</year>
</date>
<date date-type="accepted">
<day>30</day>
<month>1</month>
<year>2025</year>
</date>
</history>
<permissions>
<copyright-statement>&#x00A9; 2025 The Authors.</copyright-statement>
<copyright-year>2025</copyright-year>
<copyright-holder>Published by Tech Science Press.</copyright-holder>
<license xlink:href="https://creativecommons.org/licenses/by/4.0/">
<license-p>This work is licensed under a <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://creativecommons.org/licenses/by/4.0/">Creative Commons Attribution 4.0 International License</ext-link>, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.</license-p>
</license>
</permissions>
<self-uri content-type="pdf" xlink:href="TSP_CMES_61472.pdf"></self-uri>
<abstract>
<p>Efficient resource management within Internet of Things (IoT) environments remains a pressing challenge due to the increasing number of devices and their diverse functionalities. This study introduces a neural network-based model that uses Long-Short-Term Memory (LSTM) to optimize resource allocation under dynamically changing conditions. Designed to monitor the workload on individual IoT nodes, the model incorporates long-term data dependencies, enabling adaptive resource distribution in real time. The training process utilizes Min-Max normalization and grid search for hyperparameter tuning, ensuring high resource utilization and consistent performance. The simulation results demonstrate the effectiveness of the proposed method, outperforming the state-of-the-art approaches, including Dynamic and Efficient Enhanced Load-Balancing (DEELB), Optimized Scheduling and Collaborative Active Resource-management (OSCAR), Convolutional Neural Network with Monarch Butterfly Optimization (CNN-MBO), and Autonomic Workload Prediction and Resource Allocation for Fog (AWPR-FOG). For example, in scenarios with low system utilization, the model achieved a resource utilization efficiency of 95% while maintaining a latency of just 15 ms, significantly exceeding the performance of comparative methods.</p>
</abstract>
<kwd-group kwd-group-type="author">
<kwd>Internet of things</kwd>
<kwd>resource optimization</kwd>
<kwd>deep learning</kwd>
<kwd>optimal resource allocation</kwd>
<kwd>neural network</kwd>
<kwd>efficiency</kwd>
</kwd-group>
<funding-group>
<award-group id="awg1">
<funding-source>Deanship of Graduate Studies and Scientific Research, Jazan University</funding-source>
<award-id>ISP-2024</award-id>
</award-group>
</funding-group>
</article-meta>
</front>
<body>
<sec id="s1">
<label>1</label>
<title>Introduction</title>
<p>The Internet of Things (IoT) has become a significant technological paradigm, redefining the interaction and integration of devices within the digital ecosystem. [<xref ref-type="bibr" rid="ref-1">1</xref>&#x2013;<xref ref-type="bibr" rid="ref-4">4</xref>]. In IoT systems, the main focus is to achieve seamless integration in several dominions with the help of an elaborate network consisting of connected sensors [<xref ref-type="bibr" rid="ref-5">5</xref>], actuators and intelligent devices [<xref ref-type="bibr" rid="ref-6">6</xref>]. This connected architecture can allow a wide range of applications [<xref ref-type="bibr" rid="ref-7">7</xref>], to be automated, allowing data-driven decision making to be realized; these include addressing various critical quality attributes. However, the increasing scale and complexity of IoT ecosystems implies the need for robust mechanisms that can ensure optimal performance in the presence of challenges related to computational resource constraints [<xref ref-type="bibr" rid="ref-8">8</xref>&#x2013;<xref ref-type="bibr" rid="ref-10">10</xref>]. The resolution of these challenges is very significant for the widespread adoption of IoT in practical applications in the real world [<xref ref-type="bibr" rid="ref-11">11</xref>&#x2013;<xref ref-type="bibr" rid="ref-14">14</xref>]. Resource allocation is one of the major challenges to the implementation of IoT systems [<xref ref-type="bibr" rid="ref-15">15</xref>]. Resource allocation needs to be efficiently distributed within the growing device network. Conventional static models used for resource allocation do not adapt in dynamic IoT environments. This lack leads to a deficient utilization of resources [<xref ref-type="bibr" rid="ref-16">16</xref>], increased latency, and high energy consumption [<xref ref-type="bibr" rid="ref-17">17</xref>,<xref ref-type="bibr" rid="ref-18">18</xref>].</p>
<p>Resource allocation remains one of the critical challenges in the deployment of IoT systems [<xref ref-type="bibr" rid="ref-19">19</xref>]. A challenging issue is how to distribute limited resources effectively among the increasing number of interconnected devices [<xref ref-type="bibr" rid="ref-20">20</xref>]. The traditional static models of allocation, though at the foundation, have some inherent limitations. They lack the flexibility needed to adapt to the ever-changing resource demands of IoT ecosystems [<xref ref-type="bibr" rid="ref-21">21</xref>,<xref ref-type="bibr" rid="ref-22">22</xref>]. These models rely on a predefined resource distribution, assuming certain fixed and static requirements. This rigidity significantly reduces the efficiency of IoT systems, whose resource requirements may change over time [<xref ref-type="bibr" rid="ref-23">23</xref>]. Static allocation methods do not fill the gaps in resources dynamically as they appear; this causes unnecessary delays, increased energy consumption, and a lack of efficiency that undermines the sustainability of IoT environments [<xref ref-type="bibr" rid="ref-24">24</xref>&#x2013;<xref ref-type="bibr" rid="ref-26">26</xref>]. Overcoming these limitations will definitely help IoT systems perform at their best under dynamic real-world conditions.</p>
<p>Conventional static allocation models, which are designed based on fixed resource requirement assumptions, are not able to cope with the dynamically changing requirements typical of the IoT ecosystem. These models consider rigid distributions of resources, thus not fitting in well for situations where resource needs vary over time. This limited adaptability often introduces a number of inefficiencies, which manifest themselves through increased latency or unnecessary/extra energy consumptions, which impact the operational efficiency and sustainability of IoT infrastructures accordingly [<xref ref-type="bibr" rid="ref-27">27</xref>&#x2013;<xref ref-type="bibr" rid="ref-29">29</xref>]. These inefficiencies limit Adaptive Neural Network-based Dynamic Resource Allocation (ANNDRA-IoT) approaches, necessitating long- and short-term memory (LSTM) networks with both long- and short-term memories for a proposal. It sets the performance optimally by using real-time analytical resources, hence dynamically adjusting the resources according to their ever-changing conditions via IoT systems. This kind of adaptability can be achieved very well in diverse IoT ecological surroundings, which was beyond the efficacy of previous ones. The proposed ANNDRA-IoT has mainly performed the following:
<list list-type="bullet">
<list-item>
<p>LSTM-Based Real-Time Dynamic Resource Allocation in the IoT. The model outsmarts traditional static allocation methods by learning to adapt to unique patterns in data flows in the IoT.</p></list-item>
<list-item>
<p>Optimized distribution of resources by predicting and adapting to changes in IoT networks. This would result in reductions in latency and energy consumption.</p></list-item>
<list-item>
<p>The effectiveness in scalability and adaptability to manage resources in the various IoT scenarios. This flexibility expands the applicability of ANNDRA-IoT in many applications.</p></list-item>
</list></p>
<p>The following sections are arranged as follows. <xref ref-type="sec" rid="s2">Section 2</xref> provides a comprehensive review of the literature. <xref ref-type="sec" rid="s3">Section 3</xref> presents the proposed ANNDRA-IoT approach. <xref ref-type="sec" rid="s4">Section 4</xref>-Experimental Simulation &#x0026; Results. <xref ref-type="sec" rid="s5">Section 5</xref> presents a detailed discussion of the results. Finally, <xref ref-type="sec" rid="s6">Section 6</xref> serves as the conclusion of the article.</p>
</sec>
<sec id="s2">
<label>2</label>
<title>Related Work</title>
<p>The IoT has become a transformative technology, significantly altering the way computing and communication systems function. It has introduced new paradigms of connectivity and interaction across a wide range of devices and systems. However, efficiently managing resources in IoT environments remains a significant challenge. This section analyzes recent advances and methodologies in the management of IoT resources. <xref ref-type="table" rid="table-1">Table 1</xref> summarizes these approaches, highlights their strengths, and identifies the gaps that the proposed ANNDRA-IoT model aims to address.</p>
<table-wrap id="table-1">
<label>Table 1</label>
<caption>
<title>Comparative review of advances and challenges in IoT resource management techniques</title>
</caption>
<table>
<colgroup>
<col/>
<col align="center"/>
<col align="center"/>
</colgroup>
<thead>
<tr>
<th>Ref.</th>
<th align="center">Advances</th>
<th align="center">Challenges</th>
</tr>
</thead>
<tbody>
<tr>
<td>[<xref ref-type="bibr" rid="ref-3">3</xref>]</td>
<td>Developed a dynamic optimization framework for balancing loads in IoT systems.</td>
<td>Compatibility with diverse IoT environments remains an issue.</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-18">18</xref>]</td>
<td>Introduced a refined strategy for task scheduling with preemptive actions in fog layers of IoT.</td>
<td>Struggles in scenarios with highly fluctuating IoT workloads.</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-30">30</xref>]</td>
<td>Proposed an adaptive task allocation model using deep learning for cloud environments.</td>
<td>Did not fully explore potential in edge computing scenarios.</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-31">31</xref>]</td>
<td>Formulated a predictive resource allocation framework for the industrial IoT sector.</td>
<td>Did not fully delve into unique industrial IoT challenges.</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-32">32</xref>]</td>
<td>Reviewed distributed AI techniques for enhancing resource efficiency in IoT.</td>
<td>Absence of detailed case studies and practical applications.</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-33">33</xref>]</td>
<td>Suggested a model for efficient energy management in IoT&#x2019;s sensor networks.</td>
<td>Discussion on model&#x2019;s adaptability to different network types was limited.</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-34">34</xref>]</td>
<td>Investigated strategies for improving communication efficiency at the IoT edge.</td>
<td>Lack of consideration for integration with existing legacy systems.</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-35">35</xref>]</td>
<td>Examined multi-resource allocation in IoT with an emphasis on fairness and efficiency.</td>
<td>Did not evaluate the impact on overall system performance.</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-36">36</xref>]</td>
<td>Applied an imperialist competitive algorithm for service deployment in fog computing.</td>
<td>Performance issues under rapidly changing network scenarios.</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-37">37</xref>]</td>
<td>Addressed energy-efficient federated learning approaches for edge computing in IoT.</td>
<td>Consideration for broader network architecture was missing.</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-38">38</xref>]</td>
<td>Offered a hybrid approach for authentication in heterogeneous IoT settings.</td>
<td>Challenges with scalability and real-time operations in diverse environments were overlooked.</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-39">39</xref>]</td>
<td>Explored distributed service placement strategies in fog environments via optimization.</td>
<td>Comprehensive computational overhead analysis was lacking.</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-40">40</xref>]</td>
<td>Showcased a strategy for energy-efficient offloading in mobile edge computing for IoT.</td>
<td>Depth of adaptability to changing network conditions was not thoroughly investigated.</td>
</tr>
</tbody>
</table>
</table-wrap>
<sec id="s2_1">
<label>2.1</label>
<title>Existing State-of-the-Art Approaches</title>
<p>In [<xref ref-type="bibr" rid="ref-3">3</xref>], the authors proposed a dynamic load balancing mechanism to improve the efficiency and adaptability of the IoT environment. Their research work highlighted how dynamic resource management approaches can provide a solution to fluctuating workloads in IoT environments. Similarly, study [<xref ref-type="bibr" rid="ref-18">18</xref>] proposed an optimized task-scheduling mechanism specifically for fog-assisted IoT environments. It develops this mechanism to introduce preemptive features in scheduling architectures. This concept has been closely aligned with our efforts to improve responsiveness in IoT systems. The study in [<xref ref-type="bibr" rid="ref-30">30</xref>] presented an overview of the secure and adaptive deep learning cloud task scheduling. In their approach, by marrying security with efficiency, there is a developed focus on managing computational tasks efficiently, hence laying down the principles that could echo the ANNDRA-IoT framework objectives. Meanwhile, in [<xref ref-type="bibr" rid="ref-31">31</xref>], the authors have proposed an autonomic framework for workload prediction and resource allocation in industrial IoT systems. Predictive analysis and autonomic allocation strategies in their work share common goals with ANNDRA-IoT and point out the necessity for intelligent resource management.</p>
<p>The authors in [<xref ref-type="bibr" rid="ref-32">32</xref>] conducted a comprehensive review of resource-efficient distributed AI methods for IoT applications. Their review highlighted the increasing demand for AI-driven solutions, laying the foundations for integrating AI to optimize IoT resource allocation-a central theme in our research. On the other hand, study [<xref ref-type="bibr" rid="ref-33">33</xref>] developed an energy management model for wireless sensor networks in IoT systems, emphasizing resource optimization. Finally, reference [<xref ref-type="bibr" rid="ref-34">34</xref>] studied the AI-driven communication-efficient method at the edge of IoT. The contributions of [<xref ref-type="bibr" rid="ref-34">34</xref>] complement our work in minimizing communications overhead in IoT settings. Furthermore, study [<xref ref-type="bibr" rid="ref-35">35</xref>] proposed a multiresource allocation approach with fairness constraints; the ANNDRA-IoT model developed has considered the fairness of coverage consideration for resource allocation.</p>
<p>In [<xref ref-type="bibr" rid="ref-36">36</xref>], an imperialist competitive algorithm was used to implement IoT services in fog computing, focusing on resource utilization. Similarly, study [<xref ref-type="bibr" rid="ref-37">37</xref>] proposed a federated learning technique to achieve energy efficiency and resource optimization within environmentally sustainable IoT edge intelligence systems. These studies align with the goals of ANNDRA-IoT to maintain energy-efficient operations. Lastly, study [<xref ref-type="bibr" rid="ref-38">38</xref>] presented a hybrid authentication architecture for heterogeneous IoT systems, blending centralized and blockchain-based methods. This approach addresses security and efficiency, critical to the secure functioning of IoT environments. Works such as [<xref ref-type="bibr" rid="ref-39">39</xref>] and [<xref ref-type="bibr" rid="ref-40">40</xref>] further contribute to this discourse by exploring distributed IoT service placement and energy-efficient task offloading strategies, respectively.</p>
</sec>
<sec id="s2_2">
<label>2.2</label>
<title>Comparison of LSTM in IoT Resource Management</title>
<p>The management of resources within the IoT has seen significant advancements through the adoption of LSTM neural networks. <xref ref-type="table" rid="table-2">Table 2</xref> provides a comparison including rule-based systems, classic machine learning techniques, and different neural network designs.</p>
<table-wrap id="table-2">
<label>Table 2</label>
<caption>
<title>Comparison of ANNDRA-IoT with other approaches in IoT resource management</title>
</caption>
<table>
<colgroup>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
</colgroup>
<thead>
<tr>
<th align="center">Approach</th>
<th align="center">Performance</th>
<th align="center">Scalability</th>
<th align="center">Ease of Implementation</th>
</tr>
</thead>
<tbody>
<tr>
<td>LSTM-based neural networks</td>
<td>enhanced capturing temporal dependencies, leading to enhanced forecasting accuracy.</td>
<td>Highly scalable with the ability to process large-scale time-series data efficiently.</td>
<td>Requires expertise in neural network configuration and training.</td>
</tr>
<tr>
<td>Rule-based systems</td>
<td>Limited by static rules, less effective in dynamic environments.</td>
<td>Scalability is constrained by the complexity of rules and their maintenance.</td>
<td>Relatively easier implementation but difficult to adapt to new environment without manual intervention.</td>
</tr>
<tr>
<td>Traditional machine learning algorithms (e.g., SVMs, DTs)</td>
<td>Effective in structured data environments but struggles with high-dimensional and sequential data.</td>
<td>Moderate scalability; performance may degrade with very large datasets.</td>
<td>Implementation complexity varies with the algorithm; significant domain knowledge is required for feature engineering.</td>
</tr>
<tr>
<td>Alternative neural network architectures (e.g., CNNs, GRUs)</td>
<td>Varies by architecture; CNNs are effective for spatial data, while GRUs offer advantages in temporal data processing.</td>
<td>Scalability is generally high, similar to LSTMs.</td>
<td>Implementation complexity is dependent on the specific architecture and the problem domain.</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>LSTM, a type of recurrent neural network, has the distinct ability to identify and retain temporal patterns, making it essential for managing resources in IoT scenarios characterized by time-series data. In [<xref ref-type="bibr" rid="ref-41">41</xref>], experimental evidence demonstrated that LSTMs exhibited superior predictive performance by effectively capturing temporal dynamics. This capability improves resource allocation strategies, thus improving the responsiveness of IoT systems [<xref ref-type="bibr" rid="ref-13">13</xref>,<xref ref-type="bibr" rid="ref-41">41</xref>,<xref ref-type="bibr" rid="ref-42">42</xref>]. In contrast, rule-based systems perform inadequately in dynamic IoT environments due to their static nature. Their inability to adapt to evolving data patterns renders them ineffective compared to LSTM models, which can seamlessly integrate new information and maintain consistent performance as system configurations evolve.</p>
<p>Conventional machine learning techniques, including support vector machines and decision trees, played a fundamental role in the early stages of IoT resource management. However, their reliance on manual feature selection and significant domain expertise limits their applicability in complex, high-dimensional sequential data scenarios [<xref ref-type="bibr" rid="ref-43">43</xref>,<xref ref-type="bibr" rid="ref-44">44</xref>]. LSTMs address these limitations by processing intricate sequential information with remarkable efficiency, which makes them particularly suited to the sophisticated demands of IoT frameworks. Other neural network architectures, such as convolutional neural networks (CNNs) and gated recurring units (GRUs), have their own strengths in the management of spatial and temporal data [<xref ref-type="bibr" rid="ref-45">45</xref>]. Hybrid models that integrate CNNs with LSTM have proven especially effective in tasks such as solar irradiance prediction and photovoltaic power [<xref ref-type="bibr" rid="ref-46">46</xref>]. These combinations balance computational efficiency with predictive accuracy, overcoming the constraints of single-architecture models in IoT applications [<xref ref-type="bibr" rid="ref-47">47</xref>].</p>
</sec>
</sec>
<sec id="s3">
<label>3</label>
<title>Proposed ANNDRA-IoT Approach</title>
<p>This ANNDRA-IoT framework implements a type of neural network known as long-short-term memory neural networks to address disorders in resource allocation in heterogeneous IoT environments. This framework has considered IoT devices&#x2019; heterogeneity by being able to adapt at run-time to different device capabilities and demands. The implementation details of ANNDRA-IoT will be elaborated here, which mentions the key contributions towards increasing system performance with the optimization of resource utilization.</p>
<sec id="s3_1">
<label>3.1</label>
<title>Overview of Proposed Approach (ANNDRA-IoT)</title>
<p>ANNDRA-IoT has been proposed for resource management in highly heterogeneous IoTs. Introduce reconfigurability for adaptation in versatile and complex scenarios related to IoT ecosystems. By incorporating LSTM neural networks with Artificial Neural Networks (ANNs), ANNDRA-IoT enables dynamic allocation of resources, thus performing self-adaptation even under complex operational conditions. This system uses prediction capabilities as an intelligent one, working in real time to manage network and computational resources through device utilization patterns.</p>
<p>The architecture of ANNDRA-IoT includes LSTM units responsible for processing input data streams from a variety of IoT devices. These units analyze resource usage patterns and generate resource allocation decisions. <xref ref-type="fig" rid="fig-1">Fig. 1</xref> illustrates the architecture, showcasing the interaction among the system&#x2019;s components and the data flow within ANNDRA-IoT.</p>
<fig id="fig-1">
<label>Figure 1</label>
<caption>
<title>The architecture of the proposed ANNDRA-IoT appraoch</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMES_61472-fig-1.tif"/>
</fig>
</sec>
<sec id="s3_2">
<label>3.2</label>
<title>LSTM-Based Real-Time IoT Resource Allocation</title>
<p>This section introduces a new LSTM neural network that is suitable for real-time IoT resource allocation. The framework is based on stochastic calculus, tensor analysis, variational optimization, differential geometry, and information theory; thus, it can learn sophisticated temporal and multi-dimensional dynamics of an IoT system.</p>
<p>Consider an IoT environment comprising a set of devices <inline-formula id="ieqn-1"><mml:math id="mml-ieqn-1"><mml:mrow><mml:mi>&#x1D49F;</mml:mi></mml:mrow><mml:mo>=</mml:mo><mml:mo fence="false" stretchy="false">{</mml:mo><mml:msub><mml:mi>d</mml:mi><mml:mn>1</mml:mn></mml:msub><mml:mo>,</mml:mo><mml:msub><mml:mi>d</mml:mi><mml:mn>2</mml:mn></mml:msub><mml:mo>,</mml:mo><mml:mo>&#x2026;</mml:mo><mml:mo>,</mml:mo><mml:msub><mml:mi>d</mml:mi><mml:mi>N</mml:mi></mml:msub><mml:mo fence="false" stretchy="false">}</mml:mo></mml:math></inline-formula>, each generating multidimensional data streams over continuous time. Let the state of the entire IoT system at time <inline-formula id="ieqn-2"><mml:math id="mml-ieqn-2"><mml:mi>t</mml:mi></mml:math></inline-formula> be represented by a stochastic process <inline-formula id="ieqn-3"><mml:math id="mml-ieqn-3"><mml:mi mathvariant="bold">X</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>t</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo>&#x2208;</mml:mo><mml:msup><mml:mrow><mml:mi mathvariant="double-struck">R</mml:mi></mml:mrow><mml:mi>n</mml:mi></mml:msup></mml:math></inline-formula>, where <inline-formula id="ieqn-4"><mml:math id="mml-ieqn-4"><mml:mi>n</mml:mi></mml:math></inline-formula> denotes the dimensionality of the state space of the system. The objective is to determine an optimal resource allocation policy <inline-formula id="ieqn-5"><mml:math id="mml-ieqn-5"><mml:msup><mml:mi>&#x03C0;</mml:mi><mml:mo>&#x2217;</mml:mo></mml:msup></mml:math></inline-formula> that minimizes a cumulative cost functional over a finite time horizon <inline-formula id="ieqn-6"><mml:math id="mml-ieqn-6"><mml:mo stretchy="false">[</mml:mo><mml:mn>0</mml:mn><mml:mo>,</mml:mo><mml:mi>T</mml:mi><mml:mo stretchy="false">]</mml:mo></mml:math></inline-formula>:
<disp-formula id="eqn-1"><label>(1)</label><mml:math id="mml-eqn-1" display="block"><mml:mtable columnalign="right left right left right left right left right left right left" rowspacing="3pt" columnspacing="0em 2em 0em 2em 0em 2em 0em 2em 0em 2em 0em" displaystyle="true"><mml:mtr><mml:mtd><mml:msup><mml:mi>&#x03C0;</mml:mi><mml:mo>&#x2217;</mml:mo></mml:msup><mml:mo>=</mml:mo><mml:munder><mml:mi>argmin</mml:mi><mml:mrow><mml:mi>&#x03C0;</mml:mi><mml:mo>&#x2208;</mml:mo><mml:mi mathvariant="normal">&#x03A0;</mml:mi></mml:mrow></mml:munder><mml:mspace width="thinmathspace" /><mml:mi mathvariant="bold">E</mml:mi><mml:mrow><mml:mo>[</mml:mo><mml:msubsup><mml:mo>&#x222B;</mml:mo><mml:mn>0</mml:mn><mml:mi>T</mml:mi></mml:msubsup><mml:mrow><mml:mi>&#x02112;</mml:mi></mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mi mathvariant="bold">X</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>t</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo>,</mml:mo><mml:mi>&#x03C0;</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi mathvariant="bold">X</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>t</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo>,</mml:mo><mml:mi>t</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo>,</mml:mo><mml:mi>t</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mspace width="thinmathspace" /><mml:mi>d</mml:mi><mml:mi>t</mml:mi><mml:mo>+</mml:mo><mml:mi mathvariant="normal">&#x03A6;</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi mathvariant="bold">X</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>T</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo stretchy="false">)</mml:mo><mml:mo>]</mml:mo></mml:mrow><mml:mo>,</mml:mo></mml:mtd></mml:mtr></mml:mtable></mml:math></disp-formula>where <inline-formula id="ieqn-7"><mml:math id="mml-ieqn-7"><mml:mi mathvariant="normal">&#x03A0;</mml:mi></mml:math></inline-formula> is the set of admissible policies, <inline-formula id="ieqn-8"><mml:math id="mml-ieqn-8"><mml:mrow><mml:mi>&#x02112;</mml:mi></mml:mrow></mml:math></inline-formula> is an instantaneous cost function capturing resource utilization and performance metrics, and <inline-formula id="ieqn-9"><mml:math id="mml-ieqn-9"><mml:mi mathvariant="normal">&#x03A6;</mml:mi></mml:math></inline-formula> is a terminal cost function. The evolution of the state of the IoT system <inline-formula id="ieqn-10"><mml:math id="mml-ieqn-10"><mml:mi mathvariant="bold">X</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>t</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula> is governed by a controlled stochastic differential equation (SDE):
<disp-formula id="eqn-2"><label>(2)</label><mml:math id="mml-eqn-2" display="block"><mml:mtable columnalign="right left right left right left right left right left right left" rowspacing="3pt" columnspacing="0em 2em 0em 2em 0em 2em 0em 2em 0em 2em 0em" displaystyle="true"><mml:mtr><mml:mtd><mml:mi>d</mml:mi><mml:mi mathvariant="bold">X</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>t</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo>=</mml:mo><mml:mi mathvariant="bold">f</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi mathvariant="bold">X</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>t</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo>,</mml:mo><mml:mi>&#x03C0;</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi mathvariant="bold">X</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>t</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo>,</mml:mo><mml:mi>t</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo>,</mml:mo><mml:mi>t</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mspace width="thinmathspace" /><mml:mi>d</mml:mi><mml:mi>t</mml:mi><mml:mo>+</mml:mo><mml:mi mathvariant="bold">G</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi mathvariant="bold">X</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>t</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo>,</mml:mo><mml:mi>t</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mspace width="thinmathspace" /><mml:mi>d</mml:mi><mml:mi mathvariant="bold">W</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>t</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo>,</mml:mo></mml:mtd></mml:mtr></mml:mtable></mml:math></disp-formula>where <inline-formula id="ieqn-11"><mml:math id="mml-ieqn-11"><mml:mi mathvariant="bold">f</mml:mi><mml:mo>:</mml:mo><mml:msup><mml:mrow><mml:mi mathvariant="double-struck">R</mml:mi></mml:mrow><mml:mi>n</mml:mi></mml:msup><mml:mo>&#x00D7;</mml:mo><mml:msup><mml:mrow><mml:mi mathvariant="double-struck">R</mml:mi></mml:mrow><mml:mi>m</mml:mi></mml:msup><mml:mo>&#x00D7;</mml:mo><mml:mo stretchy="false">[</mml:mo><mml:mn>0</mml:mn><mml:mo>,</mml:mo><mml:mi>T</mml:mi><mml:mo stretchy="false">]</mml:mo><mml:mo stretchy="false">&#x2192;</mml:mo><mml:msup><mml:mrow><mml:mi mathvariant="double-struck">R</mml:mi></mml:mrow><mml:mi>n</mml:mi></mml:msup></mml:math></inline-formula> is the drift term, <inline-formula id="ieqn-12"><mml:math id="mml-ieqn-12"><mml:mi mathvariant="bold">G</mml:mi><mml:mo>:</mml:mo><mml:msup><mml:mrow><mml:mi mathvariant="double-struck">R</mml:mi></mml:mrow><mml:mi>n</mml:mi></mml:msup><mml:mo>&#x00D7;</mml:mo><mml:mo stretchy="false">[</mml:mo><mml:mn>0</mml:mn><mml:mo>,</mml:mo><mml:mi>T</mml:mi><mml:mo stretchy="false">]</mml:mo><mml:mo stretchy="false">&#x2192;</mml:mo><mml:msup><mml:mrow><mml:mi mathvariant="double-struck">R</mml:mi></mml:mrow><mml:mrow><mml:mi>n</mml:mi><mml:mo>&#x00D7;</mml:mo><mml:mi>k</mml:mi></mml:mrow></mml:msup></mml:math></inline-formula> is the diffusion term and <inline-formula id="ieqn-13"><mml:math id="mml-ieqn-13"><mml:mi mathvariant="bold">W</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>t</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula> is a Wiener process of dimensions <inline-formula id="ieqn-14"><mml:math id="mml-ieqn-14"><mml:mi>k</mml:mi></mml:math></inline-formula> representing environmental uncertainties. To approximate the optimal policy <inline-formula id="ieqn-15"><mml:math id="mml-ieqn-15"><mml:msup><mml:mi>&#x03C0;</mml:mi><mml:mo>&#x2217;</mml:mo></mml:msup></mml:math></inline-formula>, we construct an LSTM neural network enhanced with tensor operations and higher-order gates. Let <inline-formula id="ieqn-16"><mml:math id="mml-ieqn-16"><mml:msub><mml:mi mathvariant="bold">x</mml:mi><mml:mi>t</mml:mi></mml:msub><mml:mo>&#x2208;</mml:mo><mml:msup><mml:mrow><mml:mi mathvariant="double-struck">R</mml:mi></mml:mrow><mml:mi>p</mml:mi></mml:msup></mml:math></inline-formula> denote the input vector in time <inline-formula id="ieqn-17"><mml:math id="mml-ieqn-17"><mml:mi>t</mml:mi></mml:math></inline-formula>, representing sensor readings and device statuses. The LSTM cell is redefined using the tensor calculus to handle multidimensional interactions:
<disp-formula id="eqn-3"><label>(3)</label><mml:math id="mml-eqn-3" display="block"><mml:mtable columnalign="right left right left right left right left right left right left" rowspacing="3pt" columnspacing="0em 2em 0em 2em 0em 2em 0em 2em 0em 2em 0em" displaystyle="true"><mml:mtr><mml:mtd><mml:msub><mml:mi mathvariant="bold">i</mml:mi><mml:mi>t</mml:mi></mml:msub></mml:mtd><mml:mtd><mml:mi></mml:mi><mml:mo>=</mml:mo><mml:mi>&#x03C3;</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:msub><mml:mrow><mml:mi>&#x1D4B2;</mml:mi></mml:mrow><mml:mi>i</mml:mi></mml:msub><mml:mo>&#x2217;</mml:mo><mml:msub><mml:mi mathvariant="bold">x</mml:mi><mml:mi>t</mml:mi></mml:msub><mml:mo>+</mml:mo><mml:msub><mml:mrow><mml:mi>&#x1D4B0;</mml:mi></mml:mrow><mml:mi>i</mml:mi></mml:msub><mml:mo>&#x2217;</mml:mo><mml:msub><mml:mi mathvariant="bold">h</mml:mi><mml:mrow><mml:mi>t</mml:mi><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo>+</mml:mo><mml:msub><mml:mrow><mml:mi>&#x1D4B1;</mml:mi></mml:mrow><mml:mi>i</mml:mi></mml:msub><mml:mo>&#x2217;</mml:mo><mml:msub><mml:mi mathvariant="bold">c</mml:mi><mml:mrow><mml:mi>t</mml:mi><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo>+</mml:mo><mml:msub><mml:mi mathvariant="bold">b</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mo>)</mml:mo></mml:mrow><mml:mo>,</mml:mo></mml:mtd></mml:mtr></mml:mtable></mml:math></disp-formula>
<disp-formula id="eqn-4"><label>(4)</label><mml:math id="mml-eqn-4" display="block"><mml:mtable columnalign="right left right left right left right left right left right left" rowspacing="3pt" columnspacing="0em 2em 0em 2em 0em 2em 0em 2em 0em 2em 0em" displaystyle="true"><mml:mtr><mml:mtd><mml:msub><mml:mi mathvariant="bold">f</mml:mi><mml:mi>t</mml:mi></mml:msub></mml:mtd><mml:mtd><mml:mi></mml:mi><mml:mo>=</mml:mo><mml:mi>&#x03C3;</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:msub><mml:mrow><mml:mi>&#x1D4B2;</mml:mi></mml:mrow><mml:mi>f</mml:mi></mml:msub><mml:mo>&#x2217;</mml:mo><mml:msub><mml:mi mathvariant="bold">x</mml:mi><mml:mi>t</mml:mi></mml:msub><mml:mo>+</mml:mo><mml:msub><mml:mrow><mml:mi>&#x1D4B0;</mml:mi></mml:mrow><mml:mi>f</mml:mi></mml:msub><mml:mo>&#x2217;</mml:mo><mml:msub><mml:mi mathvariant="bold">h</mml:mi><mml:mrow><mml:mi>t</mml:mi><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo>+</mml:mo><mml:msub><mml:mrow><mml:mi>&#x1D4B1;</mml:mi></mml:mrow><mml:mi>f</mml:mi></mml:msub><mml:mo>&#x2217;</mml:mo><mml:msub><mml:mi mathvariant="bold">c</mml:mi><mml:mrow><mml:mi>t</mml:mi><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo>+</mml:mo><mml:msub><mml:mi mathvariant="bold">b</mml:mi><mml:mi>f</mml:mi></mml:msub><mml:mo>)</mml:mo></mml:mrow><mml:mo>,</mml:mo></mml:mtd></mml:mtr></mml:mtable></mml:math></disp-formula>
<disp-formula id="eqn-5"><label>(5)</label><mml:math id="mml-eqn-5" display="block"><mml:mtable columnalign="right left right left right left right left right left right left" rowspacing="3pt" columnspacing="0em 2em 0em 2em 0em 2em 0em 2em 0em 2em 0em" displaystyle="true"><mml:mtr><mml:mtd><mml:msub><mml:mi mathvariant="bold">c</mml:mi><mml:mi>t</mml:mi></mml:msub></mml:mtd><mml:mtd><mml:mi></mml:mi><mml:mo>=</mml:mo><mml:msub><mml:mi mathvariant="bold">f</mml:mi><mml:mi>t</mml:mi></mml:msub><mml:mo>&#x2299;</mml:mo><mml:msub><mml:mi mathvariant="bold">c</mml:mi><mml:mrow><mml:mi>t</mml:mi><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo>+</mml:mo><mml:msub><mml:mi mathvariant="bold">i</mml:mi><mml:mi>t</mml:mi></mml:msub><mml:mo>&#x2299;</mml:mo><mml:mi>tanh</mml:mi><mml:mo>&#x2061;</mml:mo><mml:mrow><mml:mo>(</mml:mo><mml:msub><mml:mrow><mml:mi>&#x1D4B2;</mml:mi></mml:mrow><mml:mi>c</mml:mi></mml:msub><mml:mo>&#x2217;</mml:mo><mml:msub><mml:mi mathvariant="bold">x</mml:mi><mml:mi>t</mml:mi></mml:msub><mml:mo>+</mml:mo><mml:msub><mml:mrow><mml:mi>&#x1D4B0;</mml:mi></mml:mrow><mml:mi>c</mml:mi></mml:msub><mml:mo>&#x2217;</mml:mo><mml:msub><mml:mi mathvariant="bold">h</mml:mi><mml:mrow><mml:mi>t</mml:mi><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo>+</mml:mo><mml:msub><mml:mi mathvariant="bold">b</mml:mi><mml:mi>c</mml:mi></mml:msub><mml:mo>)</mml:mo></mml:mrow><mml:mo>,</mml:mo></mml:mtd></mml:mtr></mml:mtable></mml:math></disp-formula>
<disp-formula id="eqn-6"><label>(6)</label><mml:math id="mml-eqn-6" display="block"><mml:mtable columnalign="right left right left right left right left right left right left" rowspacing="3pt" columnspacing="0em 2em 0em 2em 0em 2em 0em 2em 0em 2em 0em" displaystyle="true"><mml:mtr><mml:mtd><mml:msub><mml:mi mathvariant="bold">o</mml:mi><mml:mi>t</mml:mi></mml:msub></mml:mtd><mml:mtd><mml:mi></mml:mi><mml:mo>=</mml:mo><mml:mi>&#x03C3;</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:msub><mml:mrow><mml:mi>&#x1D4B2;</mml:mi></mml:mrow><mml:mi>o</mml:mi></mml:msub><mml:mo>&#x2217;</mml:mo><mml:msub><mml:mi mathvariant="bold">x</mml:mi><mml:mi>t</mml:mi></mml:msub><mml:mo>+</mml:mo><mml:msub><mml:mrow><mml:mi>&#x1D4B0;</mml:mi></mml:mrow><mml:mi>o</mml:mi></mml:msub><mml:mo>&#x2217;</mml:mo><mml:msub><mml:mi mathvariant="bold">h</mml:mi><mml:mrow><mml:mi>t</mml:mi><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo>+</mml:mo><mml:msub><mml:mrow><mml:mi>&#x1D4B1;</mml:mi></mml:mrow><mml:mi>o</mml:mi></mml:msub><mml:mo>&#x2217;</mml:mo><mml:msub><mml:mi mathvariant="bold">c</mml:mi><mml:mi>t</mml:mi></mml:msub><mml:mo>+</mml:mo><mml:msub><mml:mi mathvariant="bold">b</mml:mi><mml:mi>o</mml:mi></mml:msub><mml:mo>)</mml:mo></mml:mrow><mml:mo>,</mml:mo></mml:mtd></mml:mtr></mml:mtable></mml:math></disp-formula>
<disp-formula id="eqn-7"><label>(7)</label><mml:math id="mml-eqn-7" display="block"><mml:mtable columnalign="right left right left right left right left right left right left" rowspacing="3pt" columnspacing="0em 2em 0em 2em 0em 2em 0em 2em 0em 2em 0em" displaystyle="true"><mml:mtr><mml:mtd><mml:msub><mml:mi mathvariant="bold">h</mml:mi><mml:mi>t</mml:mi></mml:msub></mml:mtd><mml:mtd><mml:mi></mml:mi><mml:mo>=</mml:mo><mml:msub><mml:mi mathvariant="bold">o</mml:mi><mml:mi>t</mml:mi></mml:msub><mml:mo>&#x2299;</mml:mo><mml:mi>tanh</mml:mi><mml:mo>&#x2061;</mml:mo><mml:mo stretchy="false">(</mml:mo><mml:msub><mml:mi mathvariant="bold">c</mml:mi><mml:mi>t</mml:mi></mml:msub><mml:mo stretchy="false">)</mml:mo><mml:mo>,</mml:mo></mml:mtd></mml:mtr></mml:mtable></mml:math></disp-formula>where <inline-formula id="ieqn-18"><mml:math id="mml-ieqn-18"><mml:mo>&#x2217;</mml:mo></mml:math></inline-formula> denotes tensor contraction, <inline-formula id="ieqn-19"><mml:math id="mml-ieqn-19"><mml:mo>&#x2299;</mml:mo></mml:math></inline-formula> is the element-wise Hadamard product, and <inline-formula id="ieqn-20"><mml:math id="mml-ieqn-20"><mml:mi>&#x03C3;</mml:mi></mml:math></inline-formula> is the sigmoid activation function. Tensors <inline-formula id="ieqn-21"><mml:math id="mml-ieqn-21"><mml:msub><mml:mrow><mml:mi>&#x1D4B2;</mml:mi></mml:mrow><mml:mi>i</mml:mi></mml:msub><mml:mo>,</mml:mo><mml:msub><mml:mrow><mml:mi>&#x1D4B0;</mml:mi></mml:mrow><mml:mi>i</mml:mi></mml:msub><mml:mo>,</mml:mo><mml:msub><mml:mrow><mml:mi>&#x1D4B1;</mml:mi></mml:mrow><mml:mi>i</mml:mi></mml:msub></mml:math></inline-formula>, etc., are higher-order weight tensors that capture interactions across multiple dimensions. The LSTM network parameters are optimized using variational principles. We define an action functional <inline-formula id="ieqn-22"><mml:math id="mml-ieqn-22"><mml:mrow><mml:mi>&#x1D4AE;</mml:mi></mml:mrow></mml:math></inline-formula> associated with the policy <inline-formula id="ieqn-23"><mml:math id="mml-ieqn-23"><mml:msub><mml:mi>&#x03C0;</mml:mi><mml:mi>&#x03B8;</mml:mi></mml:msub></mml:math></inline-formula> parameterized by the network weights <inline-formula id="ieqn-24"><mml:math id="mml-ieqn-24"><mml:mi>&#x03B8;</mml:mi></mml:math></inline-formula>:
<disp-formula id="eqn-8"><label>(8)</label><mml:math id="mml-eqn-8" display="block"><mml:mtable columnalign="right left right left right left right left right left right left" rowspacing="3pt" columnspacing="0em 2em 0em 2em 0em 2em 0em 2em 0em 2em 0em" displaystyle="true"><mml:mtr><mml:mtd><mml:mrow><mml:mi>&#x1D4AE;</mml:mi></mml:mrow><mml:mo stretchy="false">[</mml:mo><mml:mi>&#x03B8;</mml:mi><mml:mo stretchy="false">]</mml:mo><mml:mo>=</mml:mo><mml:mrow><mml:mi mathvariant="double-struck">E</mml:mi></mml:mrow><mml:mrow><mml:mo>[</mml:mo><mml:msubsup><mml:mo>&#x222B;</mml:mo><mml:mn>0</mml:mn><mml:mi>T</mml:mi></mml:msubsup><mml:mrow><mml:mi>&#x02112;</mml:mi></mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:msup><mml:mi mathvariant="bold">X</mml:mi><mml:mi>&#x03B8;</mml:mi></mml:msup><mml:mo stretchy="false">(</mml:mo><mml:mi>t</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo>,</mml:mo><mml:msub><mml:mi>&#x03C0;</mml:mi><mml:mi>&#x03B8;</mml:mi></mml:msub><mml:mo stretchy="false">(</mml:mo><mml:msup><mml:mi mathvariant="bold">X</mml:mi><mml:mi>&#x03B8;</mml:mi></mml:msup><mml:mo stretchy="false">(</mml:mo><mml:mi>t</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo>,</mml:mo><mml:mi>t</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo>,</mml:mo><mml:mi>t</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mspace width="thinmathspace" /><mml:mi>d</mml:mi><mml:mi>t</mml:mi><mml:mo>+</mml:mo><mml:mi mathvariant="normal">&#x03A6;</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:msup><mml:mi mathvariant="bold">X</mml:mi><mml:mi>&#x03B8;</mml:mi></mml:msup><mml:mo stretchy="false">(</mml:mo><mml:mi>T</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo stretchy="false">)</mml:mo><mml:mo>]</mml:mo></mml:mrow><mml:mo>,</mml:mo></mml:mtd></mml:mtr></mml:mtable></mml:math></disp-formula>where <inline-formula id="ieqn-25"><mml:math id="mml-ieqn-25"><mml:msup><mml:mi mathvariant="bold">X</mml:mi><mml:mi>&#x03B8;</mml:mi></mml:msup><mml:mo stretchy="false">(</mml:mo><mml:mi>t</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula> denotes the state trajectory under policy <inline-formula id="ieqn-26"><mml:math id="mml-ieqn-26"><mml:msub><mml:mi>&#x03C0;</mml:mi><mml:mi>&#x03B8;</mml:mi></mml:msub></mml:math></inline-formula>. Optimization proceeds by computing the functional derivative <inline-formula id="ieqn-27"><mml:math id="mml-ieqn-27"><mml:mi>&#x03B4;</mml:mi><mml:mrow><mml:mi>&#x1D4AE;</mml:mi></mml:mrow><mml:mrow><mml:mo>/</mml:mo></mml:mrow><mml:mi>&#x03B4;</mml:mi><mml:mi>&#x03B8;</mml:mi></mml:math></inline-formula> and updating <inline-formula id="ieqn-28"><mml:math id="mml-ieqn-28"><mml:mi>&#x03B8;</mml:mi></mml:math></inline-formula> by gradient descent in the function space. Recognizing that the state space of the IoT system may exhibit manifold structures, we introduce differential geometric concepts. Let <inline-formula id="ieqn-29"><mml:math id="mml-ieqn-29"><mml:mrow><mml:mi>&#x02133;</mml:mi></mml:mrow></mml:math></inline-formula> be a smooth manifold representing the state space with a Riemannian metric <inline-formula id="ieqn-30"><mml:math id="mml-ieqn-30"><mml:msub><mml:mi>g</mml:mi><mml:mrow><mml:mi mathvariant="bold">X</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula>. The geodesic distance between states <inline-formula id="ieqn-31"><mml:math id="mml-ieqn-31"><mml:msub><mml:mi mathvariant="bold">X</mml:mi><mml:mn>1</mml:mn></mml:msub></mml:math></inline-formula> and <inline-formula id="ieqn-32"><mml:math id="mml-ieqn-32"><mml:msub><mml:mi mathvariant="bold">X</mml:mi><mml:mn>2</mml:mn></mml:msub></mml:math></inline-formula> is given by:
<disp-formula id="eqn-9"><label>(9)</label><mml:math id="mml-eqn-9" display="block"><mml:mtable columnalign="right left right left right left right left right left right left" rowspacing="3pt" columnspacing="0em 2em 0em 2em 0em 2em 0em 2em 0em 2em 0em" displaystyle="true"><mml:mtr><mml:mtd><mml:msub><mml:mi>d</mml:mi><mml:mrow><mml:mrow><mml:mi>&#x02133;</mml:mi></mml:mrow></mml:mrow></mml:msub><mml:mo stretchy="false">(</mml:mo><mml:msub><mml:mi mathvariant="bold">X</mml:mi><mml:mn>1</mml:mn></mml:msub><mml:mo>,</mml:mo><mml:msub><mml:mi mathvariant="bold">X</mml:mi><mml:mn>2</mml:mn></mml:msub><mml:mo stretchy="false">)</mml:mo><mml:mo>=</mml:mo><mml:munder><mml:mo movablelimits="true" form="prefix">inf</mml:mo><mml:mrow><mml:mi>&#x03B3;</mml:mi></mml:mrow></mml:munder><mml:msubsup><mml:mo>&#x222B;</mml:mo><mml:mn>0</mml:mn><mml:mn>1</mml:mn></mml:msubsup><mml:msqrt><mml:msub><mml:mi>g</mml:mi><mml:mrow><mml:mi>&#x03B3;</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>t</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:mrow></mml:msub><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mover><mml:mi>&#x03B3;</mml:mi><mml:mo>&#x02D9;</mml:mo></mml:mover></mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mi>t</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo>,</mml:mo><mml:mrow><mml:mover><mml:mi>&#x03B3;</mml:mi><mml:mo>&#x02D9;</mml:mo></mml:mover></mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mi>t</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo>)</mml:mo></mml:mrow></mml:msqrt><mml:mspace width="thinmathspace" /><mml:mi>d</mml:mi><mml:mi>t</mml:mi><mml:mo>,</mml:mo></mml:mtd></mml:mtr></mml:mtable></mml:math></disp-formula>where <inline-formula id="ieqn-33"><mml:math id="mml-ieqn-33"><mml:mi>&#x03B3;</mml:mi><mml:mo>:</mml:mo><mml:mo stretchy="false">[</mml:mo><mml:mn>0</mml:mn><mml:mo>,</mml:mo><mml:mn>1</mml:mn><mml:mo stretchy="false">]</mml:mo><mml:mo stretchy="false">&#x2192;</mml:mo><mml:mrow><mml:mi>&#x02133;</mml:mi></mml:mrow></mml:math></inline-formula> is a smooth path connecting <inline-formula id="ieqn-34"><mml:math id="mml-ieqn-34"><mml:msub><mml:mi mathvariant="bold">X</mml:mi><mml:mn>1</mml:mn></mml:msub></mml:math></inline-formula> and <inline-formula id="ieqn-35"><mml:math id="mml-ieqn-35"><mml:msub><mml:mi mathvariant="bold">X</mml:mi><mml:mn>2</mml:mn></mml:msub></mml:math></inline-formula>. We redefine the LSTM input transformation to map inputs onto <inline-formula id="ieqn-36"><mml:math id="mml-ieqn-36"><mml:mrow><mml:mi>&#x02133;</mml:mi></mml:mrow></mml:math></inline-formula>:
<disp-formula id="eqn-10"><label>(10)</label><mml:math id="mml-eqn-10" display="block"><mml:mtable columnalign="right left right left right left right left right left right left" rowspacing="3pt" columnspacing="0em 2em 0em 2em 0em 2em 0em 2em 0em 2em 0em" displaystyle="true"><mml:mtr><mml:mtd><mml:msub><mml:mi mathvariant="bold">z</mml:mi><mml:mi>t</mml:mi></mml:msub><mml:mo>=</mml:mo><mml:msub><mml:mi>exp</mml:mi><mml:mrow><mml:msub><mml:mi mathvariant="bold">h</mml:mi><mml:mrow><mml:mi>t</mml:mi><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msub></mml:mrow></mml:msub><mml:mo>&#x2061;</mml:mo><mml:mrow><mml:mo>(</mml:mo><mml:msub><mml:mrow><mml:mi>&#x1D4B2;</mml:mi></mml:mrow><mml:mi>z</mml:mi></mml:msub><mml:mo>&#x2217;</mml:mo><mml:msub><mml:mi mathvariant="bold">x</mml:mi><mml:mi>t</mml:mi></mml:msub><mml:mo>+</mml:mo><mml:msub><mml:mi mathvariant="bold">b</mml:mi><mml:mi>z</mml:mi></mml:msub><mml:mo>)</mml:mo></mml:mrow><mml:mo>,</mml:mo></mml:mtd></mml:mtr></mml:mtable></mml:math></disp-formula>where <inline-formula id="ieqn-37"><mml:math id="mml-ieqn-37"><mml:msub><mml:mi>exp</mml:mi><mml:mrow><mml:msub><mml:mi mathvariant="bold">h</mml:mi><mml:mrow><mml:mi>t</mml:mi><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msub></mml:mrow></mml:msub></mml:math></inline-formula> is the Riemannian exponential map at <inline-formula id="ieqn-38"><mml:math id="mml-ieqn-38"><mml:msub><mml:mi mathvariant="bold">h</mml:mi><mml:mrow><mml:mi>t</mml:mi><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msub></mml:math></inline-formula>. To capture non-Gaussian characteristics and higher-order dependencies in the data, we introduce gates based on higher-order statistics:
<disp-formula id="eqn-11"><label>(11)</label><mml:math id="mml-eqn-11" display="block"><mml:mtable columnalign="right left right left right left right left right left right left" rowspacing="3pt" columnspacing="0em 2em 0em 2em 0em 2em 0em 2em 0em 2em 0em" displaystyle="true"><mml:mtr><mml:mtd><mml:msub><mml:mi mathvariant="bold">k</mml:mi><mml:mi>t</mml:mi></mml:msub></mml:mtd><mml:mtd><mml:mi></mml:mi><mml:mo>=</mml:mo><mml:mi>&#x03BA;</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:msub><mml:mrow><mml:mi>&#x1D4B2;</mml:mi></mml:mrow><mml:mi>k</mml:mi></mml:msub><mml:mo>&#x2217;</mml:mo><mml:msub><mml:mi mathvariant="bold">x</mml:mi><mml:mi>t</mml:mi></mml:msub><mml:mo>+</mml:mo><mml:msub><mml:mrow><mml:mi>&#x1D4B0;</mml:mi></mml:mrow><mml:mi>k</mml:mi></mml:msub><mml:mo>&#x2217;</mml:mo><mml:msub><mml:mi mathvariant="bold">h</mml:mi><mml:mrow><mml:mi>t</mml:mi><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo>+</mml:mo><mml:msub><mml:mi mathvariant="bold">b</mml:mi><mml:mi>k</mml:mi></mml:msub><mml:mo>)</mml:mo></mml:mrow><mml:mo>,</mml:mo></mml:mtd></mml:mtr></mml:mtable></mml:math></disp-formula>
<disp-formula id="eqn-12"><label>(12)</label><mml:math id="mml-eqn-12" display="block"><mml:mtable columnalign="right left right left right left right left right left right left" rowspacing="3pt" columnspacing="0em 2em 0em 2em 0em 2em 0em 2em 0em 2em 0em" displaystyle="true"><mml:mtr><mml:mtd><mml:msub><mml:mi mathvariant="bold">s</mml:mi><mml:mi>t</mml:mi></mml:msub></mml:mtd><mml:mtd><mml:mi></mml:mi><mml:mo>=</mml:mo><mml:mi>&#x03C2;</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:msub><mml:mrow><mml:mi>&#x1D4B2;</mml:mi></mml:mrow><mml:mi>s</mml:mi></mml:msub><mml:mo>&#x2217;</mml:mo><mml:msub><mml:mi mathvariant="bold">x</mml:mi><mml:mi>t</mml:mi></mml:msub><mml:mo>+</mml:mo><mml:msub><mml:mrow><mml:mi>&#x1D4B0;</mml:mi></mml:mrow><mml:mi>s</mml:mi></mml:msub><mml:mo>&#x2217;</mml:mo><mml:msub><mml:mi mathvariant="bold">h</mml:mi><mml:mrow><mml:mi>t</mml:mi><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo>+</mml:mo><mml:msub><mml:mi mathvariant="bold">b</mml:mi><mml:mi>s</mml:mi></mml:msub><mml:mo>)</mml:mo></mml:mrow><mml:mo>,</mml:mo></mml:mtd></mml:mtr></mml:mtable></mml:math></disp-formula>where <inline-formula id="ieqn-39"><mml:math id="mml-ieqn-39"><mml:mi>&#x03BA;</mml:mi></mml:math></inline-formula> and <inline-formula id="ieqn-40"><mml:math id="mml-ieqn-40"><mml:mi>&#x03C2;</mml:mi></mml:math></inline-formula> are functions that extract kurtosis and skewness, respectively. The cell state update now includes these higher-order terms:
<disp-formula id="eqn-13"><label>(13)</label><mml:math id="mml-eqn-13" display="block"><mml:mtable columnalign="right left right left right left right left right left right left" rowspacing="3pt" columnspacing="0em 2em 0em 2em 0em 2em 0em 2em 0em 2em 0em" displaystyle="true"><mml:mtr><mml:mtd><mml:msub><mml:mi mathvariant="bold">c</mml:mi><mml:mi>t</mml:mi></mml:msub></mml:mtd><mml:mtd><mml:mi></mml:mi><mml:mo>=</mml:mo><mml:msub><mml:mi mathvariant="bold">f</mml:mi><mml:mi>t</mml:mi></mml:msub><mml:mo>&#x2299;</mml:mo><mml:msub><mml:mi mathvariant="bold">c</mml:mi><mml:mrow><mml:mi>t</mml:mi><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo>+</mml:mo><mml:msub><mml:mi mathvariant="bold">i</mml:mi><mml:mi>t</mml:mi></mml:msub><mml:mo>&#x2299;</mml:mo><mml:msub><mml:mi mathvariant="bold">g</mml:mi><mml:mi>t</mml:mi></mml:msub><mml:mo>+</mml:mo><mml:msub><mml:mi mathvariant="bold">k</mml:mi><mml:mi>t</mml:mi></mml:msub><mml:mo>&#x2299;</mml:mo><mml:mo stretchy="false">(</mml:mo><mml:msub><mml:mi mathvariant="bold">c</mml:mi><mml:mrow><mml:mi>t</mml:mi><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo>&#x229B;</mml:mo><mml:msub><mml:mi mathvariant="bold">c</mml:mi><mml:mrow><mml:mi>t</mml:mi><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo stretchy="false">)</mml:mo></mml:mtd></mml:mtr><mml:mtr><mml:mtd /><mml:mtd><mml:mi></mml:mi><mml:mspace width="1em" /><mml:mo>+</mml:mo><mml:msub><mml:mi mathvariant="bold">s</mml:mi><mml:mi>t</mml:mi></mml:msub><mml:mo>&#x2299;</mml:mo><mml:mo stretchy="false">(</mml:mo><mml:msub><mml:mi mathvariant="bold">c</mml:mi><mml:mrow><mml:mi>t</mml:mi><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo>&#x229B;</mml:mo><mml:msub><mml:mi mathvariant="bold">c</mml:mi><mml:mrow><mml:mi>t</mml:mi><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo>&#x229B;</mml:mo><mml:msub><mml:mi mathvariant="bold">c</mml:mi><mml:mrow><mml:mi>t</mml:mi><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo stretchy="false">)</mml:mo><mml:mo>,</mml:mo></mml:mtd></mml:mtr></mml:mtable></mml:math></disp-formula>where <inline-formula id="ieqn-41"><mml:math id="mml-ieqn-41"><mml:mo>&#x229B;</mml:mo></mml:math></inline-formula> denotes the element-wise tensor power. An advanced attention mechanism is incorporated using information-theoretic measures. The attention weights are defined on the basis of the mutual information between hidden states and outputs:
<disp-formula id="eqn-14"><label>(14)</label><mml:math id="mml-eqn-14" display="block"><mml:mtable columnalign="right left right left right left right left right left right left" rowspacing="3pt" columnspacing="0em 2em 0em 2em 0em 2em 0em 2em 0em 2em 0em" displaystyle="true"><mml:mtr><mml:mtd><mml:msub><mml:mi>&#x03B1;</mml:mi><mml:mi>t</mml:mi></mml:msub><mml:mo>=</mml:mo><mml:mfrac><mml:mrow><mml:mi>exp</mml:mi><mml:mo>&#x2061;</mml:mo><mml:mrow><mml:mo>(</mml:mo><mml:mi>I</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:msub><mml:mrow><mml:mtext mathvariant="bold">h</mml:mtext></mml:mrow><mml:mi>t</mml:mi></mml:msub><mml:mo>;</mml:mo><mml:msub><mml:mrow><mml:mtext mathvariant="bold">y</mml:mtext></mml:mrow><mml:mrow><mml:mi>t</mml:mi></mml:mrow></mml:msub><mml:mo stretchy="false">)</mml:mo><mml:mo>)</mml:mo></mml:mrow></mml:mrow><mml:mrow><mml:msubsup><mml:mo movablelimits="false">&#x2211;</mml:mo><mml:mrow><mml:mi>s</mml:mi><mml:mo>=</mml:mo><mml:mn>1</mml:mn></mml:mrow><mml:mi>T</mml:mi></mml:msubsup><mml:mi>exp</mml:mi><mml:mo>&#x2061;</mml:mo><mml:mrow><mml:mo>(</mml:mo><mml:mi>I</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:msub><mml:mrow><mml:mtext mathvariant="bold">h</mml:mtext></mml:mrow><mml:mi>s</mml:mi></mml:msub><mml:mo>;</mml:mo><mml:msub><mml:mrow><mml:mtext mathvariant="bold">y</mml:mtext></mml:mrow><mml:mrow><mml:mi>t</mml:mi></mml:mrow></mml:msub><mml:mo stretchy="false">)</mml:mo><mml:mo>)</mml:mo></mml:mrow></mml:mrow></mml:mfrac><mml:mo>,</mml:mo></mml:mtd></mml:mtr></mml:mtable></mml:math></disp-formula>where <inline-formula id="ieqn-42"><mml:math id="mml-ieqn-42"><mml:mi>I</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:msub><mml:mrow><mml:mtext mathvariant="bold">h</mml:mtext></mml:mrow><mml:mi>t</mml:mi></mml:msub><mml:mo>;</mml:mo><mml:msub><mml:mrow><mml:mtext mathvariant="bold">y</mml:mtext></mml:mrow><mml:mrow><mml:mi>t</mml:mi></mml:mrow></mml:msub><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula> is the mutual information between <inline-formula id="ieqn-43"><mml:math id="mml-ieqn-43"><mml:msub><mml:mrow><mml:mtext mathvariant="bold">h</mml:mtext></mml:mrow><mml:mi>t</mml:mi></mml:msub></mml:math></inline-formula> and the output <inline-formula id="ieqn-44"><mml:math id="mml-ieqn-44"><mml:msub><mml:mrow><mml:mtext mathvariant="bold">y</mml:mtext></mml:mrow><mml:mrow><mml:mi>t</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula>. This attention mechanism ensures that the most informative hidden states are emphasized in the output computation:
<disp-formula id="eqn-15"><label>(15)</label><mml:math id="mml-eqn-15" display="block"><mml:mtable columnalign="right left right left right left right left right left right left" rowspacing="3pt" columnspacing="0em 2em 0em 2em 0em 2em 0em 2em 0em 2em 0em" displaystyle="true"><mml:mtr><mml:mtd><mml:msub><mml:mrow><mml:mtext mathvariant="bold">y</mml:mtext></mml:mrow><mml:mrow><mml:mi>t</mml:mi></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:mi>&#x03D5;</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:munderover><mml:mo>&#x2211;</mml:mo><mml:mrow><mml:mi>s</mml:mi><mml:mo>=</mml:mo><mml:mn>1</mml:mn></mml:mrow><mml:mi>T</mml:mi></mml:munderover><mml:msub><mml:mi>&#x03B1;</mml:mi><mml:mi>s</mml:mi></mml:msub><mml:msub><mml:mrow><mml:mtext mathvariant="bold">h</mml:mtext></mml:mrow><mml:mi>s</mml:mi></mml:msub><mml:mo>)</mml:mo></mml:mrow><mml:mo>,</mml:mo></mml:mtd></mml:mtr></mml:mtable></mml:math></disp-formula>with <inline-formula id="ieqn-45"><mml:math id="mml-ieqn-45"><mml:mi>&#x03D5;</mml:mi></mml:math></inline-formula> being a nonlinear activation function. The optimal control problem is connected to the Hamilton-Jacobi-Bellman (HJB) equation. The value function <inline-formula id="ieqn-46"><mml:math id="mml-ieqn-46"><mml:mi>V</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:mtext mathvariant="bold">X</mml:mtext></mml:mrow><mml:mo>,</mml:mo><mml:mi>t</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula> satisfies:
<disp-formula id="eqn-16"><label>(16)</label><mml:math id="mml-eqn-16" display="block"><mml:mtable columnalign="right left right left right left right left right left right left" rowspacing="3pt" columnspacing="0em 2em 0em 2em 0em 2em 0em 2em 0em 2em 0em" displaystyle="true"><mml:mtr><mml:mtd><mml:mo>&#x2212;</mml:mo><mml:mfrac><mml:mrow><mml:mi mathvariant="normal">&#x2202;</mml:mi><mml:mi>V</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="normal">&#x2202;</mml:mi><mml:mi>t</mml:mi></mml:mrow></mml:mfrac></mml:mtd><mml:mtd><mml:mi></mml:mi><mml:mo>=</mml:mo><mml:munder><mml:mo movablelimits="true" form="prefix">min</mml:mo><mml:mrow><mml:mi>&#x03C0;</mml:mi></mml:mrow></mml:munder><mml:mrow><mml:mo>{</mml:mo><mml:mrow><mml:mi>&#x02112;</mml:mi></mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:mtext mathvariant="bold">X</mml:mtext></mml:mrow><mml:mo>,</mml:mo><mml:mi>&#x03C0;</mml:mi><mml:mo>,</mml:mo><mml:mi>t</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo>+</mml:mo><mml:mrow><mml:mo>&#x27E8;</mml:mo><mml:mfrac><mml:mrow><mml:mi mathvariant="normal">&#x2202;</mml:mi><mml:mi>V</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="normal">&#x2202;</mml:mi><mml:mrow><mml:mtext mathvariant="bold">X</mml:mtext></mml:mrow></mml:mrow></mml:mfrac><mml:mo>,</mml:mo><mml:mrow><mml:mtext mathvariant="bold">f</mml:mtext></mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:mtext mathvariant="bold">X</mml:mtext></mml:mrow><mml:mo>,</mml:mo><mml:mi>&#x03C0;</mml:mi><mml:mo>,</mml:mo><mml:mi>t</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo>&#x27E9;</mml:mo></mml:mrow><mml:mo fence="true" stretchy="true" symmetric="true"></mml:mo></mml:mrow></mml:mtd></mml:mtr><mml:mtr><mml:mtd /><mml:mtd><mml:mrow><mml:mo fence="true" stretchy="true" symmetric="true"></mml:mo><mml:mspace width="1em" /><mml:mo>+</mml:mo><mml:mfrac><mml:mn>1</mml:mn><mml:mn>2</mml:mn></mml:mfrac><mml:mi>Tr</mml:mi><mml:mo>&#x2061;</mml:mo><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mtext mathvariant="bold">G</mml:mtext></mml:mrow><mml:msup><mml:mrow><mml:mtext mathvariant="bold">G</mml:mtext></mml:mrow><mml:mi mathvariant="normal">&#x22A4;</mml:mi></mml:msup><mml:mfrac><mml:mrow><mml:msup><mml:mi mathvariant="normal">&#x2202;</mml:mi><mml:mn>2</mml:mn></mml:msup><mml:mi>V</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="normal">&#x2202;</mml:mi><mml:msup><mml:mrow><mml:mtext mathvariant="bold">X</mml:mtext></mml:mrow><mml:mn>2</mml:mn></mml:msup></mml:mrow></mml:mfrac><mml:mo>)</mml:mo></mml:mrow><mml:mo>}</mml:mo></mml:mrow><mml:mo>,</mml:mo></mml:mtd></mml:mtr></mml:mtable></mml:math></disp-formula>where <inline-formula id="ieqn-47"><mml:math id="mml-ieqn-47"><mml:mo fence="false" stretchy="false">&#x27E8;</mml:mo><mml:mo>&#x22C5;</mml:mo><mml:mo>,</mml:mo><mml:mo>&#x22C5;</mml:mo><mml:mo fence="false" stretchy="false">&#x27E9;</mml:mo></mml:math></inline-formula> denotes the inner product, and <inline-formula id="ieqn-48"><mml:math id="mml-ieqn-48"><mml:mi>Tr</mml:mi></mml:math></inline-formula> is the trace operator. The LSTM network aims to approximate the policy <inline-formula id="ieqn-49"><mml:math id="mml-ieqn-49"><mml:mi>&#x03C0;</mml:mi></mml:math></inline-formula> that minimizes the right-hand side of the HJB equation. To train the LSTM network in this complex setting, we employ Stochastic Gradient Hamiltonian Monte Carlo (SGHMC), which combines stochastic gradient descent with Hamiltonian dynamics. The parameter updates are given by:
<disp-formula id="eqn-17"><label>(17)</label><mml:math id="mml-eqn-17" display="block"><mml:mtable columnalign="right left right left right left right left right left right left" rowspacing="3pt" columnspacing="0em 2em 0em 2em 0em 2em 0em 2em 0em 2em 0em" displaystyle="true"><mml:mtr><mml:mtd><mml:mi>d</mml:mi><mml:mi>&#x03B8;</mml:mi><mml:mo>=</mml:mo><mml:mo>&#x2212;</mml:mo><mml:msub><mml:mi mathvariant="normal">&#x2207;</mml:mi><mml:mi>&#x03B8;</mml:mi></mml:msub><mml:mrow><mml:mi>&#x1D4AE;</mml:mi></mml:mrow><mml:mo stretchy="false">[</mml:mo><mml:mi>&#x03B8;</mml:mi><mml:mo stretchy="false">]</mml:mo><mml:mspace width="thinmathspace" /><mml:mi>d</mml:mi><mml:mi>t</mml:mi><mml:mo>+</mml:mo><mml:msqrt><mml:mn>2</mml:mn><mml:mi>D</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>&#x03B8;</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:msqrt><mml:mspace width="thinmathspace" /><mml:mi>d</mml:mi><mml:msub><mml:mi>B</mml:mi><mml:mi>t</mml:mi></mml:msub><mml:mo>,</mml:mo></mml:mtd></mml:mtr></mml:mtable></mml:math></disp-formula>where <inline-formula id="ieqn-50"><mml:math id="mml-ieqn-50"><mml:mi>D</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>&#x03B8;</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula> is a diffusion matrix capturing the curvature of the loss landscape, and <inline-formula id="ieqn-51"><mml:math id="mml-ieqn-51"><mml:msub><mml:mi>B</mml:mi><mml:mi>t</mml:mi></mml:msub></mml:math></inline-formula> is a Brownian motion.</p>
</sec>
<sec id="s3_3">
<label>3.3</label>
<title>Training and Optimization Framework for the LSTM Model</title>
<p>This section presents a novel mathematical framework for training and optimizing the LSTM model within the ANNDRA-IoT architecture. Let <inline-formula id="ieqn-52"><mml:math id="mml-ieqn-52"><mml:mrow><mml:mi>&#x1D49F;</mml:mi></mml:mrow><mml:mo>=</mml:mo><mml:mo fence="false" stretchy="false">{</mml:mo><mml:mo stretchy="false">(</mml:mo><mml:msub><mml:mrow><mml:mtext mathvariant="bold">x</mml:mtext></mml:mrow><mml:mi>t</mml:mi></mml:msub><mml:mo>,</mml:mo><mml:msub><mml:mrow><mml:mtext mathvariant="bold">y</mml:mtext></mml:mrow><mml:mi>t</mml:mi></mml:msub><mml:mo stretchy="false">)</mml:mo><mml:msubsup><mml:mo fence="false" stretchy="false">}</mml:mo><mml:mrow><mml:mi>t</mml:mi><mml:mo>=</mml:mo><mml:mn>1</mml:mn></mml:mrow><mml:mi>T</mml:mi></mml:msubsup></mml:math></inline-formula> denote the training dataset derived from the preprocessed TON_IoT data, where <inline-formula id="ieqn-53"><mml:math id="mml-ieqn-53"><mml:msub><mml:mrow><mml:mtext mathvariant="bold">x</mml:mtext></mml:mrow><mml:mi>t</mml:mi></mml:msub><mml:mo>&#x2208;</mml:mo><mml:msup><mml:mrow><mml:mi mathvariant="double-struck">R</mml:mi></mml:mrow><mml:mi>p</mml:mi></mml:msup></mml:math></inline-formula> represents the input features at time <inline-formula id="ieqn-54"><mml:math id="mml-ieqn-54"><mml:mi>t</mml:mi></mml:math></inline-formula>, and <inline-formula id="ieqn-55"><mml:math id="mml-ieqn-55"><mml:msub><mml:mrow><mml:mtext mathvariant="bold">y</mml:mtext></mml:mrow><mml:mi>t</mml:mi></mml:msub><mml:mo>&#x2208;</mml:mo><mml:msup><mml:mrow><mml:mi mathvariant="double-struck">R</mml:mi></mml:mrow><mml:mi>q</mml:mi></mml:msup></mml:math></inline-formula> denotes the corresponding target output for resource allocation decisions. The primary objective is to find the optimal network parameters <inline-formula id="ieqn-56"><mml:math id="mml-ieqn-56"><mml:msup><mml:mi>&#x03B8;</mml:mi><mml:mo>&#x2217;</mml:mo></mml:msup></mml:math></inline-formula> that minimize a composite loss function <inline-formula id="ieqn-57"><mml:math id="mml-ieqn-57"><mml:mrow><mml:mi>&#x1D4A5;</mml:mi></mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mi>&#x03B8;</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula>, including the empirical risk and regularization terms:
<disp-formula id="eqn-18"><label>(18)</label><mml:math id="mml-eqn-18" display="block"><mml:mtable columnalign="right left right left right left right left right left right left" rowspacing="3pt" columnspacing="0em 2em 0em 2em 0em 2em 0em 2em 0em 2em 0em" displaystyle="true"><mml:mtr><mml:mtd><mml:msup><mml:mi>&#x03B8;</mml:mi><mml:mo>&#x2217;</mml:mo></mml:msup><mml:mo>=</mml:mo><mml:mi>arg</mml:mi><mml:mo>&#x2061;</mml:mo><mml:munder><mml:mo movablelimits="true" form="prefix">min</mml:mo><mml:mrow><mml:mi>&#x03B8;</mml:mi><mml:mo>&#x2208;</mml:mo><mml:mi mathvariant="normal">&#x0398;</mml:mi></mml:mrow></mml:munder><mml:mrow><mml:mi>&#x1D4A5;</mml:mi></mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mi>&#x03B8;</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo>=</mml:mo><mml:mi>arg</mml:mi><mml:mo>&#x2061;</mml:mo><mml:munder><mml:mo movablelimits="true" form="prefix">min</mml:mo><mml:mrow><mml:mi>&#x03B8;</mml:mi><mml:mo>&#x2208;</mml:mo><mml:mi mathvariant="normal">&#x0398;</mml:mi></mml:mrow></mml:munder><mml:mrow><mml:mo>[</mml:mo><mml:mrow><mml:mi>&#x02112;</mml:mi></mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mi>&#x03B8;</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo>+</mml:mo><mml:mi>&#x03BB;</mml:mi><mml:mrow><mml:mi>&#x211B;</mml:mi></mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mi>&#x03B8;</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo>]</mml:mo></mml:mrow><mml:mo>,</mml:mo></mml:mtd></mml:mtr></mml:mtable></mml:math></disp-formula>where <inline-formula id="ieqn-58"><mml:math id="mml-ieqn-58"><mml:mi mathvariant="normal">&#x0398;</mml:mi></mml:math></inline-formula> is the parameter space, <inline-formula id="ieqn-59"><mml:math id="mml-ieqn-59"><mml:mrow><mml:mi>&#x02112;</mml:mi></mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mi>&#x03B8;</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula> is the empirical loss function defined over the training data, <inline-formula id="ieqn-60"><mml:math id="mml-ieqn-60"><mml:mrow><mml:mi>&#x211B;</mml:mi></mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mi>&#x03B8;</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula> is a regularization functional, and <inline-formula id="ieqn-61"><mml:math id="mml-ieqn-61"><mml:mi>&#x03BB;</mml:mi><mml:mo>&gt;</mml:mo><mml:mn>0</mml:mn></mml:math></inline-formula> is a regularization coefficient controlling the trade-off between data fitting and model complexity. The empirical loss function is defined using a time-averaged functional that accounts for temporal dependencies.
<disp-formula id="eqn-19"><label>(19)</label><mml:math id="mml-eqn-19" display="block"><mml:mtable columnalign="right left right left right left right left right left right left" rowspacing="3pt" columnspacing="0em 2em 0em 2em 0em 2em 0em 2em 0em 2em 0em" displaystyle="true"><mml:mtr><mml:mtd><mml:mrow><mml:mi>&#x02112;</mml:mi></mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mi>&#x03B8;</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo>=</mml:mo><mml:mfrac><mml:mn>1</mml:mn><mml:mi>T</mml:mi></mml:mfrac><mml:munderover><mml:mo movablelimits="false">&#x2211;</mml:mo><mml:mrow><mml:mi>t</mml:mi><mml:mo>=</mml:mo><mml:mn>1</mml:mn></mml:mrow><mml:mi>T</mml:mi></mml:munderover><mml:mi>&#x2113;</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:msub><mml:mrow><mml:mtext mathvariant="bold">y</mml:mtext></mml:mrow><mml:mi>t</mml:mi></mml:msub><mml:mo>,</mml:mo><mml:msub><mml:mrow><mml:mover><mml:mrow><mml:mtext mathvariant="bold">y</mml:mtext></mml:mrow><mml:mo stretchy="false">&#x005E;</mml:mo></mml:mover></mml:mrow><mml:mi>t</mml:mi></mml:msub><mml:mo stretchy="false">(</mml:mo><mml:mi>&#x03B8;</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo>)</mml:mo></mml:mrow><mml:mo>+</mml:mo><mml:mfrac><mml:mi>&#x03B2;</mml:mi><mml:mn>2</mml:mn></mml:mfrac><mml:msubsup><mml:mo>&#x222B;</mml:mo><mml:mrow><mml:mn>0</mml:mn></mml:mrow><mml:mrow><mml:mi>T</mml:mi></mml:mrow></mml:msubsup><mml:msup><mml:mrow><mml:mo symmetric="true">&#x2016;</mml:mo><mml:mfrac><mml:mi>d</mml:mi><mml:mrow><mml:mi>d</mml:mi><mml:mi>t</mml:mi></mml:mrow></mml:mfrac><mml:msub><mml:mrow><mml:mover><mml:mrow><mml:mtext mathvariant="bold">y</mml:mtext></mml:mrow><mml:mo stretchy="false">&#x005E;</mml:mo></mml:mover></mml:mrow><mml:mi>t</mml:mi></mml:msub><mml:mo stretchy="false">(</mml:mo><mml:mi>&#x03B8;</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo symmetric="true">&#x2016;</mml:mo></mml:mrow><mml:mn>2</mml:mn></mml:msup><mml:mi>d</mml:mi><mml:mi>t</mml:mi><mml:mo>,</mml:mo></mml:mtd></mml:mtr></mml:mtable></mml:math></disp-formula>where <inline-formula id="ieqn-62"><mml:math id="mml-ieqn-62"><mml:mi>&#x2113;</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mo>&#x22C5;</mml:mo><mml:mo>,</mml:mo><mml:mo>&#x22C5;</mml:mo><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula> is a loss function that measures the discrepancy between the true output <inline-formula id="ieqn-63"><mml:math id="mml-ieqn-63"><mml:msub><mml:mrow><mml:mtext mathvariant="bold">y</mml:mtext></mml:mrow><mml:mi>t</mml:mi></mml:msub></mml:math></inline-formula> and the predicted output <inline-formula id="ieqn-64"><mml:math id="mml-ieqn-64"><mml:msub><mml:mrow><mml:mover><mml:mrow><mml:mtext mathvariant="bold">y</mml:mtext></mml:mrow><mml:mo stretchy="false">&#x005E;</mml:mo></mml:mover></mml:mrow><mml:mi>t</mml:mi></mml:msub><mml:mo stretchy="false">(</mml:mo><mml:mi>&#x03B8;</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula>, <inline-formula id="ieqn-65"><mml:math id="mml-ieqn-65"><mml:mo fence="false" stretchy="false">&#x2016;</mml:mo><mml:mo>&#x22C5;</mml:mo><mml:mo fence="false" stretchy="false">&#x2016;</mml:mo></mml:math></inline-formula> denotes the Euclidean norm, and <inline-formula id="ieqn-66"><mml:math id="mml-ieqn-66"><mml:mi>&#x03B2;</mml:mi><mml:mo>&gt;</mml:mo><mml:mn>0</mml:mn></mml:math></inline-formula> is a smoothing parameter that enforces the temporal smoothness through the Sobolev norm of the predictions. The regularization functional <inline-formula id="ieqn-67"><mml:math id="mml-ieqn-67"><mml:mrow><mml:mi>&#x211B;</mml:mi></mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mi>&#x03B8;</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula> is defined using concepts from reproducing kernel Hilbert spaces (RKHS) to promote smoothness and generalization:
<disp-formula id="eqn-20"><label>(20)</label><mml:math id="mml-eqn-20" display="block"><mml:mtable columnalign="right left right left right left right left right left right left" rowspacing="3pt" columnspacing="0em 2em 0em 2em 0em 2em 0em 2em 0em 2em 0em" displaystyle="true"><mml:mtr><mml:mtd><mml:mrow><mml:mi>&#x211B;</mml:mi></mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mi>&#x03B8;</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo>=</mml:mo><mml:msubsup><mml:mrow><mml:mo symmetric="true">&#x2016;</mml:mo><mml:mi>&#x03B8;</mml:mi><mml:mo symmetric="true">&#x2016;</mml:mo></mml:mrow><mml:mrow><mml:mrow><mml:mi>&#x0210B;</mml:mi></mml:mrow></mml:mrow><mml:mn>2</mml:mn></mml:msubsup><mml:mo>=</mml:mo><mml:munder><mml:mo>&#x2211;</mml:mo><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:munder><mml:msubsup><mml:mrow><mml:mo symmetric="true">&#x2016;</mml:mo><mml:msub><mml:mi>W</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mo symmetric="true">&#x2016;</mml:mo></mml:mrow><mml:mrow><mml:mrow><mml:mi>&#x0210B;</mml:mi></mml:mrow></mml:mrow><mml:mn>2</mml:mn></mml:msubsup><mml:mo>+</mml:mo><mml:msubsup><mml:mrow><mml:mo symmetric="true">&#x2016;</mml:mo><mml:msub><mml:mi>U</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mo symmetric="true">&#x2016;</mml:mo></mml:mrow><mml:mrow><mml:mrow><mml:mi>&#x0210B;</mml:mi></mml:mrow></mml:mrow><mml:mn>2</mml:mn></mml:msubsup><mml:mo>+</mml:mo><mml:msubsup><mml:mrow><mml:mo symmetric="true">&#x2016;</mml:mo><mml:msub><mml:mi>b</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mo symmetric="true">&#x2016;</mml:mo></mml:mrow><mml:mrow><mml:mrow><mml:mi>&#x0210B;</mml:mi></mml:mrow></mml:mrow><mml:mn>2</mml:mn></mml:msubsup><mml:mo>,</mml:mo></mml:mtd></mml:mtr></mml:mtable></mml:math></disp-formula>where <inline-formula id="ieqn-68"><mml:math id="mml-ieqn-68"><mml:msub><mml:mrow><mml:mo symmetric="true">&#x2016;</mml:mo><mml:mo>&#x22C5;</mml:mo><mml:mo symmetric="true">&#x2016;</mml:mo></mml:mrow><mml:mrow><mml:mrow><mml:mi>&#x0210B;</mml:mi></mml:mrow></mml:mrow></mml:msub></mml:math></inline-formula> denotes the RKHS norm, and <inline-formula id="ieqn-69"><mml:math id="mml-ieqn-69"><mml:msub><mml:mi>W</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:math></inline-formula>, <inline-formula id="ieqn-70"><mml:math id="mml-ieqn-70"><mml:msub><mml:mi>U</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:math></inline-formula>, <inline-formula id="ieqn-71"><mml:math id="mml-ieqn-71"><mml:msub><mml:mi>b</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:math></inline-formula> are the weight matrices and bias vectors associated with the LSTM gates. This regularization encourages the parameters to lie in a smooth function space, enhancing the model&#x2019;s ability to generalize to unseen data. To solve the optimization problem, we employ stochastic gradient descent (SGD) enhanced with adaptive moment estimation and preconditioning matrices derived from second-order information:
<disp-formula id="eqn-21"><label>(21)</label><mml:math id="mml-eqn-21" display="block"><mml:mtable columnalign="right left right left right left right left right left right left" rowspacing="3pt" columnspacing="0em 2em 0em 2em 0em 2em 0em 2em 0em 2em 0em" displaystyle="true"><mml:mtr><mml:mtd><mml:msub><mml:mi>&#x03B8;</mml:mi><mml:mrow><mml:mi>k</mml:mi><mml:mo>+</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:msub><mml:mi>&#x03B8;</mml:mi><mml:mi>k</mml:mi></mml:msub><mml:mo>&#x2212;</mml:mo><mml:msub><mml:mi>&#x03B7;</mml:mi><mml:mi>k</mml:mi></mml:msub><mml:msubsup><mml:mrow><mml:mtext mathvariant="bold">P</mml:mtext></mml:mrow><mml:mi>k</mml:mi><mml:mrow><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msubsup><mml:msub><mml:mi mathvariant="normal">&#x2207;</mml:mi><mml:mi>&#x03B8;</mml:mi></mml:msub><mml:mrow><mml:mi>&#x1D4A5;</mml:mi></mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:msub><mml:mi>&#x03B8;</mml:mi><mml:mi>k</mml:mi></mml:msub><mml:mo stretchy="false">)</mml:mo><mml:mo>,</mml:mo></mml:mtd></mml:mtr></mml:mtable></mml:math></disp-formula>where <inline-formula id="ieqn-72"><mml:math id="mml-ieqn-72"><mml:msub><mml:mi>&#x03B7;</mml:mi><mml:mi>k</mml:mi></mml:msub></mml:math></inline-formula> is the learning rate in iteration <inline-formula id="ieqn-73"><mml:math id="mml-ieqn-73"><mml:mi>k</mml:mi></mml:math></inline-formula>, <inline-formula id="ieqn-74"><mml:math id="mml-ieqn-74"><mml:msub><mml:mi mathvariant="normal">&#x2207;</mml:mi><mml:mi>&#x03B8;</mml:mi></mml:msub><mml:mrow><mml:mi>&#x1D4A5;</mml:mi></mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:msub><mml:mi>&#x03B8;</mml:mi><mml:mi>k</mml:mi></mml:msub><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula> is the loss function gradient, and <inline-formula id="ieqn-75"><mml:math id="mml-ieqn-75"><mml:msub><mml:mrow><mml:mtext mathvariant="bold">P</mml:mtext></mml:mrow><mml:mi>k</mml:mi></mml:msub></mml:math></inline-formula> is a preconditioning matrix calculated as:
<disp-formula id="eqn-22"><label>(22)</label><mml:math id="mml-eqn-22" display="block"><mml:mtable columnalign="right left right left right left right left right left right left" rowspacing="3pt" columnspacing="0em 2em 0em 2em 0em 2em 0em 2em 0em 2em 0em" displaystyle="true"><mml:mtr><mml:mtd><mml:msub><mml:mrow><mml:mtext mathvariant="bold">P</mml:mtext></mml:mrow><mml:mi>k</mml:mi></mml:msub><mml:mo>=</mml:mo><mml:mi>&#x03F5;</mml:mi><mml:mrow><mml:mtext mathvariant="bold">I</mml:mtext></mml:mrow><mml:mo>+</mml:mo><mml:msup><mml:mrow><mml:mo>(</mml:mo><mml:msub><mml:mrow><mml:mover><mml:mrow><mml:mtext mathvariant="bold">v</mml:mtext></mml:mrow><mml:mo stretchy="false">&#x005E;</mml:mo></mml:mover></mml:mrow><mml:mi>k</mml:mi></mml:msub><mml:mo>)</mml:mo></mml:mrow><mml:mrow><mml:mn>1</mml:mn><mml:mrow><mml:mo>/</mml:mo></mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msup><mml:mo>,</mml:mo></mml:mtd></mml:mtr></mml:mtable></mml:math></disp-formula>with <inline-formula id="ieqn-76"><mml:math id="mml-ieqn-76"><mml:mi>&#x03F5;</mml:mi></mml:math></inline-formula> being a small constant to ensure numerical stability, <inline-formula id="ieqn-77"><mml:math id="mml-ieqn-77"><mml:mrow><mml:mtext mathvariant="bold">I</mml:mtext></mml:mrow></mml:math></inline-formula> the identity matrix, and <inline-formula id="ieqn-78"><mml:math id="mml-ieqn-78"><mml:msub><mml:mrow><mml:mover><mml:mrow><mml:mtext mathvariant="bold">v</mml:mtext></mml:mrow><mml:mo stretchy="false">&#x005E;</mml:mo></mml:mover></mml:mrow><mml:mi>k</mml:mi></mml:msub></mml:math></inline-formula> the exponentially weighted moving average of the squared gradients:
<disp-formula id="eqn-23"><label>(23)</label><mml:math id="mml-eqn-23" display="block"><mml:mtable columnalign="right left right left right left right left right left right left" rowspacing="3pt" columnspacing="0em 2em 0em 2em 0em 2em 0em 2em 0em 2em 0em" displaystyle="true"><mml:mtr><mml:mtd><mml:msub><mml:mrow><mml:mover><mml:mrow><mml:mtext mathvariant="bold">v</mml:mtext></mml:mrow><mml:mo stretchy="false">&#x005E;</mml:mo></mml:mover></mml:mrow><mml:mi>k</mml:mi></mml:msub><mml:mo>=</mml:mo><mml:mi>&#x03B3;</mml:mi><mml:msub><mml:mrow><mml:mover><mml:mrow><mml:mtext mathvariant="bold">v</mml:mtext></mml:mrow><mml:mo stretchy="false">&#x005E;</mml:mo></mml:mover></mml:mrow><mml:mrow><mml:mi>k</mml:mi><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo>+</mml:mo><mml:mo stretchy="false">(</mml:mo><mml:mn>1</mml:mn><mml:mo>&#x2212;</mml:mo><mml:mi>&#x03B3;</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mrow><mml:mo>(</mml:mo><mml:msub><mml:mi mathvariant="normal">&#x2207;</mml:mi><mml:mi>&#x03B8;</mml:mi></mml:msub><mml:mrow><mml:mi>&#x1D4A5;</mml:mi></mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:msub><mml:mi>&#x03B8;</mml:mi><mml:mi>k</mml:mi></mml:msub><mml:mo stretchy="false">)</mml:mo><mml:mo>&#x2299;</mml:mo><mml:msub><mml:mi mathvariant="normal">&#x2207;</mml:mi><mml:mi>&#x03B8;</mml:mi></mml:msub><mml:mrow><mml:mi>&#x1D4A5;</mml:mi></mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:msub><mml:mi>&#x03B8;</mml:mi><mml:mi>k</mml:mi></mml:msub><mml:mo stretchy="false">)</mml:mo><mml:mo>)</mml:mo></mml:mrow><mml:mo>,</mml:mo></mml:mtd></mml:mtr></mml:mtable></mml:math></disp-formula>where <inline-formula id="ieqn-79"><mml:math id="mml-ieqn-79"><mml:mi>&#x03B3;</mml:mi><mml:mo>&#x2208;</mml:mo><mml:mo stretchy="false">[</mml:mo><mml:mn>0</mml:mn><mml:mo>,</mml:mo><mml:mn>1</mml:mn><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula> is the decay rate and <inline-formula id="ieqn-80"><mml:math id="mml-ieqn-80"><mml:mo>&#x2299;</mml:mo></mml:math></inline-formula> denotes element-wise multiplication. This makes the learning rates of each parameter adaptive, which gives a better convergence behavior. Yet another variant of this further incorporates information geometry in order to use the natural gradient that takes into account the Riemannian structure of the parameter space:
<disp-formula id="eqn-24"><label>(24)</label><mml:math id="mml-eqn-24" display="block"><mml:mtable columnalign="right left right left right left right left right left right left" rowspacing="3pt" columnspacing="0em 2em 0em 2em 0em 2em 0em 2em 0em 2em 0em" displaystyle="true"><mml:mtr><mml:mtd><mml:msub><mml:mi>&#x03B8;</mml:mi><mml:mrow><mml:mi>k</mml:mi><mml:mo>+</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:msub><mml:mi>&#x03B8;</mml:mi><mml:mi>k</mml:mi></mml:msub><mml:mo>&#x2212;</mml:mo><mml:msub><mml:mi>&#x03B7;</mml:mi><mml:mi>k</mml:mi></mml:msub><mml:msup><mml:mrow><mml:mtext mathvariant="bold">F</mml:mtext></mml:mrow><mml:mrow><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msup><mml:mo stretchy="false">(</mml:mo><mml:msub><mml:mi>&#x03B8;</mml:mi><mml:mi>k</mml:mi></mml:msub><mml:mo stretchy="false">)</mml:mo><mml:msub><mml:mi mathvariant="normal">&#x2207;</mml:mi><mml:mi>&#x03B8;</mml:mi></mml:msub><mml:mrow><mml:mi>&#x1D4A5;</mml:mi></mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:msub><mml:mi>&#x03B8;</mml:mi><mml:mi>k</mml:mi></mml:msub><mml:mo stretchy="false">)</mml:mo><mml:mo>,</mml:mo></mml:mtd></mml:mtr></mml:mtable></mml:math></disp-formula>where <inline-formula id="ieqn-81"><mml:math id="mml-ieqn-81"><mml:mrow><mml:mtext mathvariant="bold">F</mml:mtext></mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:msub><mml:mi>&#x03B8;</mml:mi><mml:mi>k</mml:mi></mml:msub><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula> is the Fisher information matrix in iteration <inline-formula id="ieqn-82"><mml:math id="mml-ieqn-82"><mml:mi>k</mml:mi></mml:math></inline-formula>, defined as:
<disp-formula id="eqn-25"><label>(25)</label><mml:math id="mml-eqn-25" display="block"><mml:mtable columnalign="right left right left right left right left right left right left" rowspacing="3pt" columnspacing="0em 2em 0em 2em 0em 2em 0em 2em 0em 2em 0em" displaystyle="true"><mml:mtr><mml:mtd><mml:mrow><mml:mtext mathvariant="bold">F</mml:mtext></mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mi>&#x03B8;</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo>=</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="double-struck">E</mml:mi></mml:mrow><mml:mrow><mml:msub><mml:mrow><mml:mtext mathvariant="bold">x</mml:mtext></mml:mrow><mml:mi>t</mml:mi></mml:msub></mml:mrow></mml:msub><mml:mrow><mml:mo>[</mml:mo><mml:msub><mml:mi mathvariant="normal">&#x2207;</mml:mi><mml:mi>&#x03B8;</mml:mi></mml:msub><mml:mi>log</mml:mi><mml:mo>&#x2061;</mml:mo><mml:msub><mml:mi>p</mml:mi><mml:mrow><mml:mi>&#x03B8;</mml:mi></mml:mrow></mml:msub><mml:mo stretchy="false">(</mml:mo><mml:msub><mml:mrow><mml:mtext mathvariant="bold">y</mml:mtext></mml:mrow><mml:mi>t</mml:mi></mml:msub><mml:mrow><mml:mo stretchy="false">|</mml:mo></mml:mrow><mml:msub><mml:mrow><mml:mtext mathvariant="bold">x</mml:mtext></mml:mrow><mml:mi>t</mml:mi></mml:msub><mml:mo stretchy="false">)</mml:mo><mml:msub><mml:mi mathvariant="normal">&#x2207;</mml:mi><mml:mi>&#x03B8;</mml:mi></mml:msub><mml:mi>log</mml:mi><mml:mo>&#x2061;</mml:mo><mml:msub><mml:mi>p</mml:mi><mml:mrow><mml:mi>&#x03B8;</mml:mi></mml:mrow></mml:msub><mml:mo stretchy="false">(</mml:mo><mml:msub><mml:mrow><mml:mtext mathvariant="bold">y</mml:mtext></mml:mrow><mml:mi>t</mml:mi></mml:msub><mml:mrow><mml:mo stretchy="false">|</mml:mo></mml:mrow><mml:msub><mml:mrow><mml:mtext mathvariant="bold">x</mml:mtext></mml:mrow><mml:mi>t</mml:mi></mml:msub><mml:msup><mml:mo stretchy="false">)</mml:mo><mml:mi mathvariant="normal">&#x22A4;</mml:mi></mml:msup><mml:mo>]</mml:mo></mml:mrow><mml:mo>,</mml:mo></mml:mtd></mml:mtr></mml:mtable></mml:math></disp-formula>with <inline-formula id="ieqn-83"><mml:math id="mml-ieqn-83"><mml:msub><mml:mi>p</mml:mi><mml:mrow><mml:mi>&#x03B8;</mml:mi></mml:mrow></mml:msub><mml:mo stretchy="false">(</mml:mo><mml:msub><mml:mrow><mml:mtext mathvariant="bold">y</mml:mtext></mml:mrow><mml:mi>t</mml:mi></mml:msub><mml:mrow><mml:mo stretchy="false">|</mml:mo></mml:mrow><mml:msub><mml:mrow><mml:mtext mathvariant="bold">x</mml:mtext></mml:mrow><mml:mi>t</mml:mi></mml:msub><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula> being the conditional probability of the output given the input under the model parameterized by <inline-formula id="ieqn-84"><mml:math id="mml-ieqn-84"><mml:mi>&#x03B8;</mml:mi></mml:math></inline-formula>. The natural gradient descent adapts to the curvature of the parameter space, potentially leading to faster convergence. To capture the uncertainty of the model and improve generalization, we adopt a Bayesian learning framework using variational inference. We define a variational posterior <inline-formula id="ieqn-85"><mml:math id="mml-ieqn-85"><mml:mi>q</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>&#x03B8;</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula> over the model parameters and minimize the variational free energy <inline-formula id="ieqn-86"><mml:math id="mml-ieqn-86"><mml:mrow><mml:mi>&#x2131;</mml:mi></mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mi>q</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula>:
<disp-formula id="eqn-26"><label>(26)</label><mml:math id="mml-eqn-26" display="block"><mml:mtable columnalign="right left right left right left right left right left right left" rowspacing="3pt" columnspacing="0em 2em 0em 2em 0em 2em 0em 2em 0em 2em 0em" displaystyle="true"><mml:mtr><mml:mtd><mml:mrow><mml:mi>&#x2131;</mml:mi></mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mi>q</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:mtd><mml:mtd><mml:mi></mml:mi><mml:mo>=</mml:mo><mml:mo>&#x222B;</mml:mo><mml:mi>q</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>&#x03B8;</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mi>log</mml:mi><mml:mo>&#x2061;</mml:mo><mml:mfrac><mml:mrow><mml:mi>q</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>&#x03B8;</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:mrow><mml:mrow><mml:mi>p</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:mi>&#x1D49F;</mml:mi></mml:mrow><mml:mo>,</mml:mo><mml:mi>&#x03B8;</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:mrow></mml:mfrac><mml:mi>d</mml:mi><mml:mi>&#x03B8;</mml:mi></mml:mtd></mml:mtr><mml:mtr><mml:mtd /><mml:mtd><mml:mi></mml:mi><mml:mo>=</mml:mo><mml:mrow><mml:mtext>KL</mml:mtext></mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mi>q</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>&#x03B8;</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mrow><mml:mo stretchy="false">|</mml:mo></mml:mrow><mml:mrow><mml:mo stretchy="false">|</mml:mo></mml:mrow><mml:mi>p</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>&#x03B8;</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo stretchy="false">)</mml:mo><mml:mo>&#x2212;</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="double-struck">E</mml:mi></mml:mrow><mml:mrow><mml:mi>q</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>&#x03B8;</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:mrow></mml:msub><mml:mo stretchy="false">[</mml:mo><mml:mi>log</mml:mi><mml:mo>&#x2061;</mml:mo><mml:mi>p</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:mi>&#x1D49F;</mml:mi></mml:mrow><mml:mrow><mml:mo stretchy="false">|</mml:mo></mml:mrow><mml:mi>&#x03B8;</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo stretchy="false">]</mml:mo><mml:mo>,</mml:mo></mml:mtd></mml:mtr></mml:mtable></mml:math></disp-formula>where <inline-formula id="ieqn-87"><mml:math id="mml-ieqn-87"><mml:mi>p</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>&#x03B8;</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula> is the prior distribution over parameters, <inline-formula id="ieqn-88"><mml:math id="mml-ieqn-88"><mml:mi>p</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:mi>&#x1D49F;</mml:mi></mml:mrow><mml:mo>,</mml:mo><mml:mi>&#x03B8;</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula> is the joint probability of data and parameters, and <inline-formula id="ieqn-89"><mml:math id="mml-ieqn-89"><mml:mrow><mml:mi mathvariant="normal">K</mml:mi><mml:mi mathvariant="normal">L</mml:mi></mml:mrow></mml:math></inline-formula> denotes the Kullback-Leibler divergence. The optimization seeks a variational distribution <inline-formula id="ieqn-90"><mml:math id="mml-ieqn-90"><mml:mi>q</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>&#x03B8;</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula> that approximates the true posterior, balancing the fit and complexity of the model. This study also introduces entropy regularization to encourage exploration during training.
<disp-formula id="eqn-27"><label>(27)</label><mml:math id="mml-eqn-27" display="block"><mml:mtable columnalign="right left right left right left right left right left right left" rowspacing="3pt" columnspacing="0em 2em 0em 2em 0em 2em 0em 2em 0em 2em 0em" displaystyle="true"><mml:mtr><mml:mtd><mml:msub><mml:mrow><mml:mi>&#x1D4A5;</mml:mi></mml:mrow><mml:mrow><mml:mrow><mml:mtext>entropy</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo stretchy="false">(</mml:mo><mml:mi>&#x03B8;</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo>=</mml:mo><mml:mrow><mml:mi>&#x1D4A5;</mml:mi></mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mi>&#x03B8;</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo>&#x2212;</mml:mo><mml:mi>&#x03BC;</mml:mi><mml:mi>H</mml:mi><mml:mo stretchy="false">[</mml:mo><mml:mi>q</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>&#x03B8;</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo stretchy="false">]</mml:mo><mml:mo>,</mml:mo></mml:mtd></mml:mtr></mml:mtable></mml:math></disp-formula>where <inline-formula id="ieqn-91"><mml:math id="mml-ieqn-91"><mml:mi>H</mml:mi><mml:mo stretchy="false">[</mml:mo><mml:mi>q</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>&#x03B8;</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo stretchy="false">]</mml:mo></mml:math></inline-formula> is the differential entropy of the variational posterior:
<disp-formula id="eqn-28"><label>(28)</label><mml:math id="mml-eqn-28" display="block"><mml:mtable columnalign="right left right left right left right left right left right left" rowspacing="3pt" columnspacing="0em 2em 0em 2em 0em 2em 0em 2em 0em 2em 0em" displaystyle="true"><mml:mtr><mml:mtd><mml:mi>H</mml:mi><mml:mo stretchy="false">[</mml:mo><mml:mi>q</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>&#x03B8;</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo stretchy="false">]</mml:mo><mml:mo>=</mml:mo><mml:mo>&#x2212;</mml:mo><mml:mo>&#x222B;</mml:mo><mml:mi>q</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>&#x03B8;</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mi>log</mml:mi><mml:mo>&#x2061;</mml:mo><mml:mi>q</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>&#x03B8;</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mi>d</mml:mi><mml:mi>&#x03B8;</mml:mi><mml:mo>,</mml:mo></mml:mtd></mml:mtr></mml:mtable></mml:math></disp-formula>and <inline-formula id="ieqn-92"><mml:math id="mml-ieqn-92"><mml:mi>&#x03BC;</mml:mi><mml:mo>&gt;</mml:mo><mml:mn>0</mml:mn></mml:math></inline-formula> is a coefficient that controls the influence of regularization of the entropy. To analyze the convergence properties of the optimization algorithm, the proposed approach utilizes convex analysis and establishes conditions under which the loss function <inline-formula id="ieqn-93"><mml:math id="mml-ieqn-93"><mml:mrow><mml:mi>&#x1D4A5;</mml:mi></mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mi>&#x03B8;</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula> is convex or satisfies the inequality:
<disp-formula id="eqn-29"><label>(29)</label><mml:math id="mml-eqn-29" display="block"><mml:mtable columnalign="right left right left right left right left right left right left" rowspacing="3pt" columnspacing="0em 2em 0em 2em 0em 2em 0em 2em 0em 2em 0em" displaystyle="true"><mml:mtr><mml:mtd><mml:mfrac><mml:mn>1</mml:mn><mml:mn>2</mml:mn></mml:mfrac><mml:mo fence="false" stretchy="false">&#x2016;</mml:mo><mml:msub><mml:mi mathvariant="normal">&#x2207;</mml:mi><mml:mi>&#x03B8;</mml:mi></mml:msub><mml:mrow><mml:mi>&#x1D4A5;</mml:mi></mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mi>&#x03B8;</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:msup><mml:mo fence="false" stretchy="false">&#x2016;</mml:mo><mml:mn>2</mml:mn></mml:msup><mml:mo>&#x2265;</mml:mo><mml:msub><mml:mi>&#x03BC;</mml:mi><mml:mrow><mml:mrow><mml:mtext>PL</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mi>&#x1D4A5;</mml:mi></mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mi>&#x03B8;</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo>&#x2212;</mml:mo><mml:mrow><mml:mi>&#x1D4A5;</mml:mi></mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:msup><mml:mi>&#x03B8;</mml:mi><mml:mo>&#x2217;</mml:mo></mml:msup><mml:mo stretchy="false">)</mml:mo><mml:mo>)</mml:mo></mml:mrow><mml:mo>,</mml:mo></mml:mtd></mml:mtr></mml:mtable></mml:math></disp-formula>where <inline-formula id="ieqn-94"><mml:math id="mml-ieqn-94"><mml:msub><mml:mi>&#x03BC;</mml:mi><mml:mrow><mml:mtext>PL</mml:mtext></mml:mrow></mml:msub><mml:mo>&gt;</mml:mo><mml:mn>0</mml:mn></mml:math></inline-formula> is the PL constant. Under this condition, gradient descent methods exhibit linear convergence rates. In addition to standard L2 regularization, we incorporate Total Variation (TV) regularization to penalize rapid changes in the parameter space:
<disp-formula id="eqn-30"><label>(30)</label><mml:math id="mml-eqn-30" display="block"><mml:mtable columnalign="right left right left right left right left right left right left" rowspacing="3pt" columnspacing="0em 2em 0em 2em 0em 2em 0em 2em 0em 2em 0em" displaystyle="true"><mml:mtr><mml:mtd><mml:msub><mml:mrow><mml:mi>&#x211B;</mml:mi></mml:mrow><mml:mrow><mml:mrow><mml:mtext>TV</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo stretchy="false">(</mml:mo><mml:mi>&#x03B8;</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo>=</mml:mo><mml:mo>&#x222B;</mml:mo><mml:mo fence="false" stretchy="false">&#x2016;</mml:mo><mml:mi mathvariant="normal">&#x2207;</mml:mi><mml:mi>&#x03B8;</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>s</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo fence="false" stretchy="false">&#x2016;</mml:mo><mml:mi>d</mml:mi><mml:mi>s</mml:mi><mml:mo>,</mml:mo></mml:mtd></mml:mtr></mml:mtable></mml:math></disp-formula>where <inline-formula id="ieqn-95"><mml:math id="mml-ieqn-95"><mml:mi>&#x03B8;</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>s</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula> denotes the parameters as a function over a continuous index <inline-formula id="ieqn-96"><mml:math id="mml-ieqn-96"><mml:mi>s</mml:mi></mml:math></inline-formula>, and <inline-formula id="ieqn-97"><mml:math id="mml-ieqn-97"><mml:mi mathvariant="normal">&#x2207;</mml:mi><mml:mi>&#x03B8;</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>s</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula> is the gradient with respect to <inline-formula id="ieqn-98"><mml:math id="mml-ieqn-98"><mml:mi>s</mml:mi></mml:math></inline-formula>. This approach further integrates adaptive learning rates based on the spectral properties of the Hessian matrix <inline-formula id="ieqn-99"><mml:math id="mml-ieqn-99"><mml:mrow><mml:mtext mathvariant="bold">H</mml:mtext></mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mi>&#x03B8;</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula> of the loss function:
<disp-formula id="eqn-31"><label>(31)</label><mml:math id="mml-eqn-31" display="block"><mml:mtable columnalign="right left right left right left right left right left right left" rowspacing="3pt" columnspacing="0em 2em 0em 2em 0em 2em 0em 2em 0em 2em 0em" displaystyle="true"><mml:mtr><mml:mtd><mml:msub><mml:mi>&#x03B7;</mml:mi><mml:mi>k</mml:mi></mml:msub><mml:mo>=</mml:mo><mml:mfrac><mml:mn>2</mml:mn><mml:mrow><mml:msub><mml:mi>&#x03BB;</mml:mi><mml:mrow><mml:mo movablelimits="true" form="prefix">max</mml:mo></mml:mrow></mml:msub><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:mtext mathvariant="bold">H</mml:mtext></mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:msub><mml:mi>&#x03B8;</mml:mi><mml:mi>k</mml:mi></mml:msub><mml:mo stretchy="false">)</mml:mo><mml:mo stretchy="false">)</mml:mo><mml:mo>+</mml:mo><mml:msub><mml:mi>&#x03BB;</mml:mi><mml:mrow><mml:mo movablelimits="true" form="prefix">min</mml:mo></mml:mrow></mml:msub><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:mtext mathvariant="bold">H</mml:mtext></mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:msub><mml:mi>&#x03B8;</mml:mi><mml:mi>k</mml:mi></mml:msub><mml:mo stretchy="false">)</mml:mo><mml:mo stretchy="false">)</mml:mo></mml:mrow></mml:mfrac><mml:mo>,</mml:mo></mml:mtd></mml:mtr></mml:mtable></mml:math></disp-formula>where <inline-formula id="ieqn-100"><mml:math id="mml-ieqn-100"><mml:msub><mml:mi>&#x03BB;</mml:mi><mml:mrow><mml:mo movablelimits="true" form="prefix">max</mml:mo></mml:mrow></mml:msub></mml:math></inline-formula> and <inline-formula id="ieqn-101"><mml:math id="mml-ieqn-101"><mml:msub><mml:mi>&#x03BB;</mml:mi><mml:mrow><mml:mo movablelimits="true" form="prefix">min</mml:mo></mml:mrow></mml:msub></mml:math></inline-formula> are the largest and smallest eigenvalues of <inline-formula id="ieqn-102"><mml:math id="mml-ieqn-102"><mml:mrow><mml:mtext mathvariant="bold">H</mml:mtext></mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:msub><mml:mi>&#x03B8;</mml:mi><mml:mi>k</mml:mi></mml:msub><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula>, respectively. This choice of learning rate ensures stable convergence by taking into account the curvature of the loss landscape. The advanced training algorithm integrates the concepts mentioned above and is outlined as Algorithm 1.</p>
<fig id="fig-7">
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMES_61472-fig-7.tif"/>
</fig>
<p>We incorporate constraints into the optimization problem to ensure feasibility with respect to resource limitations:
<disp-formula id="eqn-32"><label>(32)</label><mml:math id="mml-eqn-32" display="block"><mml:mtable columnalign="right left right left right left right left right left right left" rowspacing="3pt" columnspacing="0em 2em 0em 2em 0em 2em 0em 2em 0em 2em 0em" displaystyle="true"><mml:mtr><mml:mtd><mml:mrow><mml:mtext>Find&#xA0;</mml:mtext></mml:mrow><mml:msup><mml:mi>&#x03B8;</mml:mi><mml:mo>&#x2217;</mml:mo></mml:msup><mml:mrow><mml:mtext>&#xA0;such that&#xA0;</mml:mtext></mml:mrow><mml:msup><mml:mi>&#x03B8;</mml:mi><mml:mo>&#x2217;</mml:mo></mml:msup><mml:mo>=</mml:mo><mml:mi>arg</mml:mi><mml:mo>&#x2061;</mml:mo><mml:munder><mml:mo movablelimits="true" form="prefix">min</mml:mo><mml:mrow><mml:mi>&#x03B8;</mml:mi><mml:mo>&#x2208;</mml:mo><mml:mi mathvariant="normal">&#x0398;</mml:mi></mml:mrow></mml:munder><mml:mrow><mml:mi>&#x1D4A5;</mml:mi></mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mi>&#x03B8;</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo>,</mml:mo><mml:mspace width="1em" /><mml:mrow><mml:mtext>s.t.</mml:mtext></mml:mrow><mml:mspace width="1em" /><mml:mrow><mml:mi>&#x1D49E;</mml:mi></mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mi>&#x03B8;</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo>&#x2264;</mml:mo><mml:msub><mml:mi>C</mml:mi><mml:mrow><mml:mo movablelimits="true" form="prefix">max</mml:mo></mml:mrow></mml:msub><mml:mo>,</mml:mo></mml:mtd></mml:mtr></mml:mtable></mml:math></disp-formula>where <inline-formula id="ieqn-112"><mml:math id="mml-ieqn-112"><mml:mrow><mml:mi>&#x1D49E;</mml:mi></mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mi>&#x03B8;</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula> is a cost function representing computational or energy resources consumed by the model, and <inline-formula id="ieqn-113"><mml:math id="mml-ieqn-113"><mml:msub><mml:mi>C</mml:mi><mml:mrow><mml:mo movablelimits="true" form="prefix">max</mml:mo></mml:mrow></mml:msub></mml:math></inline-formula> is the maximum allowable cost. This constrained optimization can be addressed using Lagrangian multipliers or penalty methods. To ensure the global convergence of the training algorithm, we employ Lyapunov stability analysis. We define a Lyapunov function <inline-formula id="ieqn-114"><mml:math id="mml-ieqn-114"><mml:mi>V</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:msub><mml:mi>&#x03B8;</mml:mi><mml:mi>k</mml:mi></mml:msub><mml:mo stretchy="false">)</mml:mo><mml:mo>=</mml:mo><mml:mrow><mml:mi>&#x1D4A5;</mml:mi></mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:msub><mml:mi>&#x03B8;</mml:mi><mml:mi>k</mml:mi></mml:msub><mml:mo stretchy="false">)</mml:mo><mml:mo>&#x2212;</mml:mo><mml:mrow><mml:mi>&#x1D4A5;</mml:mi></mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:msup><mml:mi>&#x03B8;</mml:mi><mml:mo>&#x2217;</mml:mo></mml:msup><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula> and show that:
<disp-formula id="eqn-33"><label>(33)</label><mml:math id="mml-eqn-33" display="block"><mml:mtable columnalign="right left right left right left right left right left right left" rowspacing="3pt" columnspacing="0em 2em 0em 2em 0em 2em 0em 2em 0em 2em 0em" displaystyle="true"><mml:mtr><mml:mtd><mml:mi>V</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:msub><mml:mi>&#x03B8;</mml:mi><mml:mrow><mml:mi>k</mml:mi><mml:mo>+</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo stretchy="false">)</mml:mo><mml:mo>&#x2212;</mml:mo><mml:mi>V</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:msub><mml:mi>&#x03B8;</mml:mi><mml:mi>k</mml:mi></mml:msub><mml:mo stretchy="false">)</mml:mo><mml:mo>&#x2264;</mml:mo><mml:mo>&#x2212;</mml:mo><mml:mi>&#x03B1;</mml:mi><mml:mi>V</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:msub><mml:mi>&#x03B8;</mml:mi><mml:mi>k</mml:mi></mml:msub><mml:mo stretchy="false">)</mml:mo><mml:mo>,</mml:mo></mml:mtd></mml:mtr></mml:mtable></mml:math></disp-formula>for some <inline-formula id="ieqn-115"><mml:math id="mml-ieqn-115"><mml:mi>&#x03B1;</mml:mi><mml:mo>&gt;</mml:mo><mml:mn>0</mml:mn></mml:math></inline-formula>, implying exponential convergence to the global minimum.</p>
</sec>
<sec id="s3_4">
<label>3.4</label>
<title>Advanced Framework for Adaptation and Scalability of the LSTM Model in IoT Systems</title>
<p>This framework incorporated decentralized optimization, variational inference, and nonlinear dynamical systems to address the challenges posed by the heterogeneous and dynamic nature of IoT environments.</p>
<sec id="s3_4_1">
<label>3.4.1</label>
<title>Manifold Embedding for Adaptive Representations</title>
<p>Let <inline-formula id="ieqn-116"><mml:math id="mml-ieqn-116"><mml:mrow><mml:mi>&#x1D4B3;</mml:mi></mml:mrow></mml:math></inline-formula> denote the high-dimensional input space of IoT data streams. We assume that the data lie on a lower-dimensional manifold <inline-formula id="ieqn-117"><mml:math id="mml-ieqn-117"><mml:mrow><mml:mi>&#x02133;</mml:mi></mml:mrow><mml:mo>&#x2282;</mml:mo><mml:msup><mml:mrow><mml:mi mathvariant="double-struck">R</mml:mi></mml:mrow><mml:mi>n</mml:mi></mml:msup></mml:math></inline-formula> embedded in <inline-formula id="ieqn-118"><mml:math id="mml-ieqn-118"><mml:mrow><mml:mi>&#x1D4B3;</mml:mi></mml:mrow></mml:math></inline-formula>. To capture the intrinsic geometry of the data, we map inputs to a manifold-adapted feature space using a diffeomorphic mapping <inline-formula id="ieqn-119"><mml:math id="mml-ieqn-119"><mml:mi>&#x03D5;</mml:mi><mml:mo>:</mml:mo><mml:mrow><mml:mi>&#x02133;</mml:mi></mml:mrow><mml:mo stretchy="false">&#x2192;</mml:mo><mml:msup><mml:mrow><mml:mi mathvariant="double-struck">R</mml:mi></mml:mrow><mml:mi>d</mml:mi></mml:msup></mml:math></inline-formula>. The LSTM cell is redefined to operate on manifold-valued inputs:
<disp-formula id="eqn-34"><label>(34)</label><mml:math id="mml-eqn-34" display="block"><mml:mtable columnalign="right left right left right left right left right left right left" rowspacing="3pt" columnspacing="0em 2em 0em 2em 0em 2em 0em 2em 0em 2em 0em" displaystyle="true"><mml:mtr><mml:mtd><mml:msub><mml:mrow><mml:mtext mathvariant="bold">i</mml:mtext></mml:mrow><mml:mi>t</mml:mi></mml:msub></mml:mtd><mml:mtd><mml:mi></mml:mi><mml:mo>=</mml:mo><mml:mi>&#x03C3;</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:msub><mml:mrow><mml:mtext mathvariant="bold">W</mml:mtext></mml:mrow><mml:mi>i</mml:mi></mml:msub><mml:mi>&#x03D5;</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:msub><mml:mrow><mml:mtext mathvariant="bold">x</mml:mtext></mml:mrow><mml:mi>t</mml:mi></mml:msub><mml:mo stretchy="false">)</mml:mo><mml:mo>+</mml:mo><mml:msub><mml:mrow><mml:mtext mathvariant="bold">U</mml:mtext></mml:mrow><mml:mi>i</mml:mi></mml:msub><mml:msub><mml:mrow><mml:mtext mathvariant="bold">h</mml:mtext></mml:mrow><mml:mrow><mml:mi>t</mml:mi><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo>+</mml:mo><mml:msub><mml:mrow><mml:mtext mathvariant="bold">b</mml:mtext></mml:mrow><mml:mi>i</mml:mi></mml:msub><mml:mo>)</mml:mo></mml:mrow><mml:mo>,</mml:mo></mml:mtd></mml:mtr></mml:mtable></mml:math></disp-formula>
<disp-formula id="eqn-35"><label>(35)</label><mml:math id="mml-eqn-35" display="block"><mml:mtable columnalign="right left right left right left right left right left right left" rowspacing="3pt" columnspacing="0em 2em 0em 2em 0em 2em 0em 2em 0em 2em 0em" displaystyle="true"><mml:mtr><mml:mtd><mml:msub><mml:mrow><mml:mtext mathvariant="bold">f</mml:mtext></mml:mrow><mml:mi>t</mml:mi></mml:msub></mml:mtd><mml:mtd><mml:mi></mml:mi><mml:mo>=</mml:mo><mml:mi>&#x03C3;</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:msub><mml:mrow><mml:mtext mathvariant="bold">W</mml:mtext></mml:mrow><mml:mi>f</mml:mi></mml:msub><mml:mi>&#x03D5;</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:msub><mml:mrow><mml:mtext mathvariant="bold">x</mml:mtext></mml:mrow><mml:mi>t</mml:mi></mml:msub><mml:mo stretchy="false">)</mml:mo><mml:mo>+</mml:mo><mml:msub><mml:mrow><mml:mtext mathvariant="bold">U</mml:mtext></mml:mrow><mml:mi>f</mml:mi></mml:msub><mml:msub><mml:mrow><mml:mtext mathvariant="bold">h</mml:mtext></mml:mrow><mml:mrow><mml:mi>t</mml:mi><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo>+</mml:mo><mml:msub><mml:mrow><mml:mtext mathvariant="bold">b</mml:mtext></mml:mrow><mml:mi>f</mml:mi></mml:msub><mml:mo>)</mml:mo></mml:mrow><mml:mo>,</mml:mo></mml:mtd></mml:mtr></mml:mtable></mml:math></disp-formula>
<disp-formula id="eqn-36"><label>(36)</label><mml:math id="mml-eqn-36" display="block"><mml:mtable columnalign="right left right left right left right left right left right left" rowspacing="3pt" columnspacing="0em 2em 0em 2em 0em 2em 0em 2em 0em 2em 0em" displaystyle="true"><mml:mtr><mml:mtd><mml:msub><mml:mrow><mml:mtext mathvariant="bold">c</mml:mtext></mml:mrow><mml:mi>t</mml:mi></mml:msub></mml:mtd><mml:mtd><mml:mi></mml:mi><mml:mo>=</mml:mo><mml:msub><mml:mrow><mml:mtext mathvariant="bold">f</mml:mtext></mml:mrow><mml:mi>t</mml:mi></mml:msub><mml:mo>&#x2299;</mml:mo><mml:msub><mml:mrow><mml:mtext mathvariant="bold">c</mml:mtext></mml:mrow><mml:mrow><mml:mi>t</mml:mi><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo>+</mml:mo><mml:msub><mml:mrow><mml:mtext mathvariant="bold">i</mml:mtext></mml:mrow><mml:mi>t</mml:mi></mml:msub><mml:mo>&#x2299;</mml:mo><mml:mi>tanh</mml:mi><mml:mo>&#x2061;</mml:mo><mml:mrow><mml:mo>(</mml:mo><mml:msub><mml:mrow><mml:mtext mathvariant="bold">W</mml:mtext></mml:mrow><mml:mi>c</mml:mi></mml:msub><mml:mi>&#x03D5;</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:msub><mml:mrow><mml:mtext mathvariant="bold">x</mml:mtext></mml:mrow><mml:mi>t</mml:mi></mml:msub><mml:mo stretchy="false">)</mml:mo><mml:mo>+</mml:mo><mml:msub><mml:mrow><mml:mtext mathvariant="bold">U</mml:mtext></mml:mrow><mml:mi>c</mml:mi></mml:msub><mml:msub><mml:mrow><mml:mtext mathvariant="bold">h</mml:mtext></mml:mrow><mml:mrow><mml:mi>t</mml:mi><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo>+</mml:mo><mml:msub><mml:mrow><mml:mtext mathvariant="bold">b</mml:mtext></mml:mrow><mml:mi>c</mml:mi></mml:msub><mml:mo>)</mml:mo></mml:mrow><mml:mo>,</mml:mo></mml:mtd></mml:mtr></mml:mtable></mml:math></disp-formula>
<disp-formula id="eqn-37"><label>(37)</label><mml:math id="mml-eqn-37" display="block"><mml:mtable columnalign="right left right left right left right left right left right left" rowspacing="3pt" columnspacing="0em 2em 0em 2em 0em 2em 0em 2em 0em 2em 0em" displaystyle="true"><mml:mtr><mml:mtd><mml:msub><mml:mrow><mml:mtext mathvariant="bold">o</mml:mtext></mml:mrow><mml:mi>t</mml:mi></mml:msub></mml:mtd><mml:mtd><mml:mi></mml:mi><mml:mo>=</mml:mo><mml:mi>&#x03C3;</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:msub><mml:mrow><mml:mtext mathvariant="bold">W</mml:mtext></mml:mrow><mml:mi>o</mml:mi></mml:msub><mml:mi>&#x03D5;</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:msub><mml:mrow><mml:mtext mathvariant="bold">x</mml:mtext></mml:mrow><mml:mi>t</mml:mi></mml:msub><mml:mo stretchy="false">)</mml:mo><mml:mo>+</mml:mo><mml:msub><mml:mrow><mml:mtext mathvariant="bold">U</mml:mtext></mml:mrow><mml:mi>o</mml:mi></mml:msub><mml:msub><mml:mrow><mml:mtext mathvariant="bold">h</mml:mtext></mml:mrow><mml:mrow><mml:mi>t</mml:mi><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo>+</mml:mo><mml:msub><mml:mrow><mml:mtext mathvariant="bold">b</mml:mtext></mml:mrow><mml:mi>o</mml:mi></mml:msub><mml:mo>)</mml:mo></mml:mrow><mml:mo>,</mml:mo></mml:mtd></mml:mtr></mml:mtable></mml:math></disp-formula>
<disp-formula id="eqn-38"><label>(38)</label><mml:math id="mml-eqn-38" display="block"><mml:mtable columnalign="right left right left right left right left right left right left" rowspacing="3pt" columnspacing="0em 2em 0em 2em 0em 2em 0em 2em 0em 2em 0em" displaystyle="true"><mml:mtr><mml:mtd><mml:msub><mml:mrow><mml:mtext mathvariant="bold">h</mml:mtext></mml:mrow><mml:mi>t</mml:mi></mml:msub></mml:mtd><mml:mtd><mml:mi></mml:mi><mml:mo>=</mml:mo><mml:msub><mml:mrow><mml:mtext mathvariant="bold">o</mml:mtext></mml:mrow><mml:mi>t</mml:mi></mml:msub><mml:mo>&#x2299;</mml:mo><mml:mi>tanh</mml:mi><mml:mo>&#x2061;</mml:mo><mml:mrow><mml:mo>(</mml:mo><mml:msub><mml:mrow><mml:mtext mathvariant="bold">c</mml:mtext></mml:mrow><mml:mi>t</mml:mi></mml:msub><mml:mo>)</mml:mo></mml:mrow><mml:mo>.</mml:mo></mml:mtd></mml:mtr></mml:mtable></mml:math></disp-formula></p>
<p>By operating on manifold embeddings, the model adapts to the underlying data structure, improving generalization. To ensure scalability, we model the LSTM parameters as elements of a Hilbert space <inline-formula id="ieqn-120"><mml:math id="mml-ieqn-120"><mml:mrow><mml:mi>&#x0210B;</mml:mi></mml:mrow></mml:math></inline-formula> endowed with the inner product <inline-formula id="ieqn-121"><mml:math id="mml-ieqn-121"><mml:mo fence="false" stretchy="false">&#x27E8;</mml:mo><mml:mo>&#x22C5;</mml:mo><mml:mo>,</mml:mo><mml:mo>&#x22C5;</mml:mo><mml:msub><mml:mo fence="false" stretchy="false">&#x27E9;</mml:mo><mml:mrow><mml:mrow><mml:mi>&#x0210B;</mml:mi></mml:mrow></mml:mrow></mml:msub></mml:math></inline-formula>. The optimization of the network parameters <inline-formula id="ieqn-122"><mml:math id="mml-ieqn-122"><mml:mi>&#x03B8;</mml:mi><mml:mo>&#x2208;</mml:mo><mml:mrow><mml:mi>&#x0210B;</mml:mi></mml:mrow></mml:math></inline-formula> is formulated as minimizing a functional <inline-formula id="ieqn-123"><mml:math id="mml-ieqn-123"><mml:mrow><mml:mi>&#x1D4A5;</mml:mi></mml:mrow><mml:mo>:</mml:mo><mml:mrow><mml:mi>&#x0210B;</mml:mi></mml:mrow><mml:mo stretchy="false">&#x2192;</mml:mo><mml:mrow><mml:mi mathvariant="double-struck">R</mml:mi></mml:mrow></mml:math></inline-formula>:
<disp-formula id="eqn-39"><label>(39)</label><mml:math id="mml-eqn-39" display="block"><mml:mtable columnalign="right left right left right left right left right left right left" rowspacing="3pt" columnspacing="0em 2em 0em 2em 0em 2em 0em 2em 0em 2em 0em" displaystyle="true"><mml:mtr><mml:mtd><mml:msup><mml:mi>&#x03B8;</mml:mi><mml:mo>&#x2217;</mml:mo></mml:msup><mml:mo>=</mml:mo><mml:mi>arg</mml:mi><mml:mo>&#x2061;</mml:mo><mml:munder><mml:mo movablelimits="true" form="prefix">min</mml:mo><mml:mrow><mml:mi>&#x03B8;</mml:mi><mml:mo>&#x2208;</mml:mo><mml:mrow><mml:mi>&#x0210B;</mml:mi></mml:mrow></mml:mrow></mml:munder><mml:mrow><mml:mo>{</mml:mo><mml:mrow><mml:mi>&#x02112;</mml:mi></mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mi>&#x03B8;</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo>+</mml:mo><mml:mi>&#x03BB;</mml:mi><mml:mo fence="false" stretchy="false">&#x2016;</mml:mo><mml:mi>&#x03B8;</mml:mi><mml:msubsup><mml:mo fence="false" stretchy="false">&#x2016;</mml:mo><mml:mrow><mml:mrow><mml:mi>&#x0210B;</mml:mi></mml:mrow></mml:mrow><mml:mn>2</mml:mn></mml:msubsup><mml:mo>}</mml:mo></mml:mrow><mml:mo>,</mml:mo></mml:mtd></mml:mtr></mml:mtable></mml:math></disp-formula>where <inline-formula id="ieqn-124"><mml:math id="mml-ieqn-124"><mml:mrow><mml:mi>&#x02112;</mml:mi></mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mi>&#x03B8;</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula> is the empirical loss and <inline-formula id="ieqn-125"><mml:math id="mml-ieqn-125"><mml:mi>&#x03BB;</mml:mi><mml:mo>&gt;</mml:mo><mml:mn>0</mml:mn></mml:math></inline-formula> is a regularization parameter. The use of functional spaces allows for scalability through dimensionality reduction and efficient parameterization. In distributed IoT systems, data is generated across multiple devices. We employ decentralized optimization to train the LSTM model collaboratively. Let there be<italic>N</italic> devices, each with local data <inline-formula id="ieqn-126"><mml:math id="mml-ieqn-126"><mml:msub><mml:mrow><mml:mi>&#x1D49F;</mml:mi></mml:mrow><mml:mi>i</mml:mi></mml:msub></mml:math></inline-formula>. The global objective is to minimize:
<disp-formula id="eqn-40"><label>(40)</label><mml:math id="mml-eqn-40" display="block"><mml:mtable columnalign="right left right left right left right left right left right left" rowspacing="3pt" columnspacing="0em 2em 0em 2em 0em 2em 0em 2em 0em 2em 0em" displaystyle="true"><mml:mtr><mml:mtd><mml:msup><mml:mi>&#x03B8;</mml:mi><mml:mo>&#x2217;</mml:mo></mml:msup><mml:mo>=</mml:mo><mml:mi>arg</mml:mi><mml:mo>&#x2061;</mml:mo><mml:munder><mml:mo movablelimits="true" form="prefix">min</mml:mo><mml:mrow><mml:mi>&#x03B8;</mml:mi><mml:mo>&#x2208;</mml:mo><mml:mrow><mml:mi>&#x0210B;</mml:mi></mml:mrow></mml:mrow></mml:munder><mml:mrow><mml:mo>{</mml:mo><mml:mfrac><mml:mn>1</mml:mn><mml:mi>N</mml:mi></mml:mfrac><mml:munderover><mml:mo movablelimits="false">&#x2211;</mml:mo><mml:mrow><mml:mi>i</mml:mi><mml:mo>=</mml:mo><mml:mn>1</mml:mn></mml:mrow><mml:mi>N</mml:mi></mml:munderover><mml:msub><mml:mrow><mml:mi>&#x02112;</mml:mi></mml:mrow><mml:mi>i</mml:mi></mml:msub><mml:mo stretchy="false">(</mml:mo><mml:mi>&#x03B8;</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo>+</mml:mo><mml:mi>&#x03BB;</mml:mi><mml:mo fence="false" stretchy="false">&#x2016;</mml:mo><mml:mi>&#x03B8;</mml:mi><mml:msubsup><mml:mo fence="false" stretchy="false">&#x2016;</mml:mo><mml:mrow><mml:mrow><mml:mi>&#x0210B;</mml:mi></mml:mrow></mml:mrow><mml:mn>2</mml:mn></mml:msubsup><mml:mo>}</mml:mo></mml:mrow><mml:mo>.</mml:mo></mml:mtd></mml:mtr></mml:mtable></mml:math></disp-formula></p>
<p>We use a consensus-based algorithm where each device updates its local parameters <inline-formula id="ieqn-127"><mml:math id="mml-ieqn-127"><mml:msub><mml:mi>&#x03B8;</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:math></inline-formula> and communicates with neighboring devices to reach agreement:
<disp-formula id="eqn-41"><label>(41)</label><mml:math id="mml-eqn-41" display="block"><mml:mtable columnalign="right left right left right left right left right left right left" rowspacing="3pt" columnspacing="0em 2em 0em 2em 0em 2em 0em 2em 0em 2em 0em" displaystyle="true"><mml:mtr><mml:mtd><mml:msubsup><mml:mi>&#x03B8;</mml:mi><mml:mi>i</mml:mi><mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mi>k</mml:mi><mml:mo>+</mml:mo><mml:mn>1</mml:mn><mml:mo stretchy="false">)</mml:mo></mml:mrow></mml:msubsup><mml:mo>=</mml:mo><mml:msubsup><mml:mi>&#x03B8;</mml:mi><mml:mi>i</mml:mi><mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mi>k</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:mrow></mml:msubsup><mml:mo>&#x2212;</mml:mo><mml:mi>&#x03B7;</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:mi mathvariant="normal">&#x2207;</mml:mi><mml:msub><mml:mrow><mml:mi>&#x02112;</mml:mi></mml:mrow><mml:mi>i</mml:mi></mml:msub><mml:mo stretchy="false">(</mml:mo><mml:msubsup><mml:mi>&#x03B8;</mml:mi><mml:mi>i</mml:mi><mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mi>k</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:mrow></mml:msubsup><mml:mo stretchy="false">)</mml:mo><mml:mo>+</mml:mo><mml:munder><mml:mo>&#x2211;</mml:mo><mml:mrow><mml:mi>j</mml:mi><mml:mo>&#x2208;</mml:mo><mml:msub><mml:mrow><mml:mi>&#x1D4A9;</mml:mi></mml:mrow><mml:mi>i</mml:mi></mml:msub></mml:mrow></mml:munder><mml:mo stretchy="false">(</mml:mo><mml:msubsup><mml:mi>&#x03B8;</mml:mi><mml:mi>i</mml:mi><mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mi>k</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:mrow></mml:msubsup><mml:mo>&#x2212;</mml:mo><mml:msubsup><mml:mi>&#x03B8;</mml:mi><mml:mi>j</mml:mi><mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mi>k</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:mrow></mml:msubsup><mml:mo stretchy="false">)</mml:mo><mml:mo>)</mml:mo></mml:mrow><mml:mo>,</mml:mo></mml:mtd></mml:mtr></mml:mtable></mml:math></disp-formula>where <inline-formula id="ieqn-128"><mml:math id="mml-ieqn-128"><mml:msub><mml:mrow><mml:mi>&#x1D4A9;</mml:mi></mml:mrow><mml:mi>i</mml:mi></mml:msub></mml:math></inline-formula> is the set of neighboring devices of device <inline-formula id="ieqn-129"><mml:math id="mml-ieqn-129"><mml:mi>i</mml:mi></mml:math></inline-formula>, and <inline-formula id="ieqn-130"><mml:math id="mml-ieqn-130"><mml:mi>&#x03B7;</mml:mi></mml:math></inline-formula> is the learning rate. To adapt to non-stationary data distributions, we model the LSTM parameters probabilistically using variational inference. We define a posterior distribution <inline-formula id="ieqn-131"><mml:math id="mml-ieqn-131"><mml:mi>q</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>&#x03B8;</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula> over the parameters and optimize the evidence lower bound (ELBO):
<disp-formula id="eqn-42"><label>(42)</label><mml:math id="mml-eqn-42" display="block"><mml:mtable columnalign="right left right left right left right left right left right left" rowspacing="3pt" columnspacing="0em 2em 0em 2em 0em 2em 0em 2em 0em 2em 0em" displaystyle="true"><mml:mtr><mml:mtd><mml:msub><mml:mrow><mml:mi>&#x02112;</mml:mi></mml:mrow><mml:mrow><mml:mrow><mml:mtext>ELBO</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="double-struck">E</mml:mi></mml:mrow><mml:mrow><mml:mi>q</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>&#x03B8;</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:mrow></mml:msub><mml:mrow><mml:mo>[</mml:mo><mml:mi>log</mml:mi><mml:mo>&#x2061;</mml:mo><mml:mi>p</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:mi>&#x1D49F;</mml:mi></mml:mrow><mml:mrow><mml:mo stretchy="false">|</mml:mo></mml:mrow><mml:mi>&#x03B8;</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo>]</mml:mo></mml:mrow><mml:mo>&#x2212;</mml:mo><mml:mrow><mml:mtext>KL</mml:mtext></mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mi>q</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>&#x03B8;</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo fence="false" stretchy="false">&#x2016;</mml:mo><mml:mi>p</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>&#x03B8;</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo stretchy="false">)</mml:mo><mml:mo>,</mml:mo></mml:mtd></mml:mtr></mml:mtable></mml:math></disp-formula>where <inline-formula id="ieqn-132"><mml:math id="mml-ieqn-132"><mml:mi>p</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>&#x03B8;</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula> is the prior distribution, and <inline-formula id="ieqn-133"><mml:math id="mml-ieqn-133"><mml:mrow><mml:mi mathvariant="normal">K</mml:mi><mml:mi mathvariant="normal">L</mml:mi></mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mo>&#x22C5;</mml:mo><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula> denotes the Kullback-Leibler divergence. This approach allows the model to adaptively update its beliefs about the parameters in response to new data. We analyze the stability of the LSTM dynamics by modeling the hidden states as a nonlinear discrete-time dynamical system:
<disp-formula id="eqn-43"><label>(43)</label><mml:math id="mml-eqn-43" display="block"><mml:mtable columnalign="right left right left right left right left right left right left" rowspacing="3pt" columnspacing="0em 2em 0em 2em 0em 2em 0em 2em 0em 2em 0em" displaystyle="true"><mml:mtr><mml:mtd><mml:msub><mml:mrow><mml:mtext mathvariant="bold">h</mml:mtext></mml:mrow><mml:mrow><mml:mi>t</mml:mi><mml:mo>+</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:mrow><mml:mtext mathvariant="bold">F</mml:mtext></mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:msub><mml:mrow><mml:mtext mathvariant="bold">h</mml:mtext></mml:mrow><mml:mi>t</mml:mi></mml:msub><mml:mo>,</mml:mo><mml:msub><mml:mrow><mml:mtext mathvariant="bold">x</mml:mtext></mml:mrow><mml:mi>t</mml:mi></mml:msub><mml:mo>;</mml:mo><mml:mi>&#x03B8;</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo>.</mml:mo></mml:mtd></mml:mtr></mml:mtable></mml:math></disp-formula></p>
<p>Using Lyapunov&#x2019;s direct method, we establish conditions for the asymptotic stability of the system by finding a Lyapunov function <inline-formula id="ieqn-134"><mml:math id="mml-ieqn-134"><mml:mi>V</mml:mi><mml:mo>:</mml:mo><mml:msup><mml:mrow><mml:mi mathvariant="double-struck">R</mml:mi></mml:mrow><mml:mi>n</mml:mi></mml:msup><mml:mo stretchy="false">&#x2192;</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="double-struck">R</mml:mi></mml:mrow><mml:mrow><mml:mo>+</mml:mo></mml:mrow></mml:msub></mml:math></inline-formula> such that:
<disp-formula id="eqn-44"><label>(44)</label><mml:math id="mml-eqn-44" display="block"><mml:mtable columnalign="right left right left right left right left right left right left" rowspacing="3pt" columnspacing="0em 2em 0em 2em 0em 2em 0em 2em 0em 2em 0em" displaystyle="true"><mml:mtr><mml:mtd><mml:mi>V</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:msub><mml:mrow><mml:mtext mathvariant="bold">h</mml:mtext></mml:mrow><mml:mrow><mml:mi>t</mml:mi><mml:mo>+</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo stretchy="false">)</mml:mo><mml:mo>&#x2212;</mml:mo><mml:mi>V</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:msub><mml:mrow><mml:mtext mathvariant="bold">h</mml:mtext></mml:mrow><mml:mi>t</mml:mi></mml:msub><mml:mo stretchy="false">)</mml:mo><mml:mo>&#x2264;</mml:mo><mml:mo>&#x2212;</mml:mo><mml:mi>W</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:msub><mml:mrow><mml:mtext mathvariant="bold">h</mml:mtext></mml:mrow><mml:mi>t</mml:mi></mml:msub><mml:mo stretchy="false">)</mml:mo><mml:mo>,</mml:mo></mml:mtd></mml:mtr></mml:mtable></mml:math></disp-formula></p>
<p>where <inline-formula id="ieqn-135"><mml:math id="mml-ieqn-135"><mml:mi>W</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:msub><mml:mrow><mml:mtext mathvariant="bold">h</mml:mtext></mml:mrow><mml:mi>t</mml:mi></mml:msub><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula> is a positive definite function. We define a scalability metric<italic>S</italic> using mutual information to quantify the model&#x2019;s capacity to handle increasing data complexity:
<disp-formula id="eqn-45"><label>(45)</label><mml:math id="mml-eqn-45" display="block"><mml:mtable columnalign="right left right left right left right left right left right left" rowspacing="3pt" columnspacing="0em 2em 0em 2em 0em 2em 0em 2em 0em 2em 0em" displaystyle="true"><mml:mtr><mml:mtd><mml:mi>S</mml:mi><mml:mo>=</mml:mo><mml:mfrac><mml:mrow><mml:mi>I</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:mtext mathvariant="bold">Y</mml:mtext></mml:mrow><mml:mo>;</mml:mo><mml:mrow><mml:mtext mathvariant="bold">H</mml:mtext></mml:mrow><mml:mo stretchy="false">)</mml:mo></mml:mrow><mml:mi>C</mml:mi></mml:mfrac><mml:mo>,</mml:mo></mml:mtd></mml:mtr></mml:mtable></mml:math></disp-formula></p>
<p>where <inline-formula id="ieqn-136"><mml:math id="mml-ieqn-136"><mml:mi>I</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:mtext mathvariant="bold">Y</mml:mtext></mml:mrow><mml:mo>;</mml:mo><mml:mrow><mml:mtext mathvariant="bold">H</mml:mtext></mml:mrow><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula> is the mutual information between the output <inline-formula id="ieqn-137"><mml:math id="mml-ieqn-137"><mml:mrow><mml:mtext mathvariant="bold">Y</mml:mtext></mml:mrow></mml:math></inline-formula> and the hidden states <inline-formula id="ieqn-138"><mml:math id="mml-ieqn-138"><mml:mrow><mml:mtext mathvariant="bold">H</mml:mtext></mml:mrow></mml:math></inline-formula>, and<italic>C</italic> is the computational cost. A higher<italic>S</italic> indicates better scalability.</p>
</sec>
</sec>
<sec id="s3_5">
<label>3.5</label>
<title>Integration with IoT Systems</title>
<p>The development of the integrative ANNDRA-IoT model in existing and future IoT systems is the last significant step towards a deployed model with full capabilities, as shown in Algorithm 2.</p>
<fig id="fig-8">
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMES_61472-fig-8.tif"/>
</fig>
<sec id="s3_5_1">
<label>3.5.1</label>
<title>Process of Integrating ANNDRA-IoT in IoT Environments</title>
<p>The integration of ANNDRA-IoT within diverse IoT environments is a multifaceted process, involving several key steps to ensure seamless functionality and compatibility. This process is not just a mere deployment of the model but a harmonious fusion with the existing IoT ecosystem. The first step involves identifying specific points within the IoT infrastructure where the ANNDRA-IoT model can be most effective. This involves analyzing the architecture of the IoT network and pinpointing nodes where resource allocation decisions have the most significant impact. Let <inline-formula id="ieqn-153"><mml:math id="mml-ieqn-153"><mml:msub><mml:mi>N</mml:mi><mml:mrow><mml:mtext>IoT</mml:mtext></mml:mrow></mml:msub></mml:math></inline-formula> represent the set of all nodes in the IoT network, the integration points <inline-formula id="ieqn-154"><mml:math id="mml-ieqn-154"><mml:msub><mml:mi>I</mml:mi><mml:mrow><mml:mtext>p</mml:mtext></mml:mrow></mml:msub></mml:math></inline-formula> can be defined as:
<disp-formula id="eqn-46"><label>(46)</label><mml:math id="mml-eqn-46" display="block"><mml:mtable columnalign="right left right left right left right left right left right left" rowspacing="3pt" columnspacing="0em 2em 0em 2em 0em 2em 0em 2em 0em 2em 0em" displaystyle="true"><mml:mtr><mml:mtd><mml:msub><mml:mi>I</mml:mi><mml:mrow><mml:mrow><mml:mtext>p</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:mo fence="false" stretchy="false">{</mml:mo><mml:mi>n</mml:mi><mml:mo>&#x2208;</mml:mo><mml:msub><mml:mi>N</mml:mi><mml:mrow><mml:mrow><mml:mtext>IoT</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mrow><mml:mo stretchy="false">|</mml:mo></mml:mrow><mml:mrow><mml:mtext>Impact</mml:mtext></mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mi>n</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo>&gt;</mml:mo><mml:mi>&#x03B8;</mml:mi><mml:mo fence="false" stretchy="false">}</mml:mo><mml:mo>,</mml:mo></mml:mtd></mml:mtr></mml:mtable></mml:math></disp-formula></p>
<p>where <inline-formula id="ieqn-155"><mml:math id="mml-ieqn-155"><mml:mtext>Impact</mml:mtext><mml:mo stretchy="false">(</mml:mo><mml:mi>n</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula> quantifies the influence of node <inline-formula id="ieqn-156"><mml:math id="mml-ieqn-156"><mml:mi>n</mml:mi></mml:math></inline-formula> on network performance and <inline-formula id="ieqn-157"><mml:math id="mml-ieqn-157"><mml:mi>&#x03B8;</mml:mi></mml:math></inline-formula> is a predefined threshold. Configuring the data interface is crucial for the flow of information between the ANNDRA-IoT and the IoT system. This involves setting up data pipelines that feed real-time IoT data into the model and retrieve the model&#x2019;s allocation decisions. The data interface <inline-formula id="ieqn-158"><mml:math id="mml-ieqn-158"><mml:msub><mml:mi>D</mml:mi><mml:mrow><mml:mtext>intf</mml:mtext></mml:mrow></mml:msub></mml:math></inline-formula> is represented as:
<disp-formula id="eqn-47"><label>(47)</label><mml:math id="mml-eqn-47" display="block"><mml:mtable columnalign="right left right left right left right left right left right left" rowspacing="3pt" columnspacing="0em 2em 0em 2em 0em 2em 0em 2em 0em 2em 0em" displaystyle="true"><mml:mtr><mml:mtd /><mml:mtd><mml:msub><mml:mi>D</mml:mi><mml:mrow><mml:mrow><mml:mtext>intf</mml:mtext></mml:mrow><mml:mi mathvariant="normal">&#x005F;</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mi>n</mml:mi></mml:mrow></mml:mrow></mml:msub><mml:mo stretchy="false">(</mml:mo><mml:msub><mml:mi>x</mml:mi><mml:mrow><mml:mrow><mml:mtext>IoT</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo stretchy="false">)</mml:mo><mml:mo>=</mml:mo><mml:msub><mml:mi>x</mml:mi><mml:mrow><mml:mrow><mml:mtext>IoT</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo stretchy="false">&#x2192;</mml:mo><mml:mrow><mml:mtext>ANNDRA-IoT</mml:mtext></mml:mrow><mml:mo>,</mml:mo></mml:mtd></mml:mtr><mml:mtr><mml:mtd /><mml:mtd><mml:msub><mml:mi>D</mml:mi><mml:mrow><mml:mrow><mml:mtext>intf</mml:mtext></mml:mrow><mml:mi mathvariant="normal">&#x005F;</mml:mi><mml:mrow><mml:mi>o</mml:mi><mml:mi>u</mml:mi><mml:mi>t</mml:mi></mml:mrow></mml:mrow></mml:msub><mml:mo stretchy="false">(</mml:mo><mml:msub><mml:mi>y</mml:mi><mml:mrow><mml:mrow><mml:mtext>ANNORA</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo stretchy="false">)</mml:mo><mml:mo>=</mml:mo><mml:msub><mml:mi>y</mml:mi><mml:mrow><mml:mrow><mml:mtext>ANNORA</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo stretchy="false">&#x2192;</mml:mo><mml:mrow><mml:mtext>IoT System</mml:mtext></mml:mrow><mml:mo>,</mml:mo></mml:mtd></mml:mtr></mml:mtable></mml:math></disp-formula></p>
<p>where <inline-formula id="ieqn-159"><mml:math id="mml-ieqn-159"><mml:msub><mml:mi>x</mml:mi><mml:mrow><mml:mtext>IoT</mml:mtext></mml:mrow></mml:msub></mml:math></inline-formula> represents the input data from the IoT devices and <inline-formula id="ieqn-160"><mml:math id="mml-ieqn-160"><mml:msub><mml:mi>y</mml:mi><mml:mrow><mml:mtext>ANNORA</mml:mtext></mml:mrow></mml:msub></mml:math></inline-formula> is the output of the ANNDRA-IoT model. Deploying the ANNDRA-IoT model within identified integration points involves not just the installation of the model, but also its synchronization with the IoT system&#x2019;s operational tempo. This synchronization ensures that the model&#x2019;s resource allocation decisions are timely and contextually relevant. The synchronization function <inline-formula id="ieqn-161"><mml:math id="mml-ieqn-161"><mml:msub><mml:mi>S</mml:mi><mml:mrow><mml:mtext>sync</mml:mtext></mml:mrow></mml:msub></mml:math></inline-formula> can be represented as:
<disp-formula id="eqn-48"><label>(48)</label><mml:math id="mml-eqn-48" display="block"><mml:mtable columnalign="right left right left right left right left right left right left" rowspacing="3pt" columnspacing="0em 2em 0em 2em 0em 2em 0em 2em 0em 2em 0em" displaystyle="true"><mml:mtr><mml:mtd><mml:msub><mml:mi>S</mml:mi><mml:mrow><mml:mrow><mml:mtext>sync</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo stretchy="false">(</mml:mo><mml:msub><mml:mi>t</mml:mi><mml:mrow><mml:mrow><mml:mtext>model</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:msub><mml:mi>t</mml:mi><mml:mrow><mml:mrow><mml:mtext>IoT</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo stretchy="false">)</mml:mo><mml:mo>=</mml:mo><mml:mrow><mml:mtext>Align</mml:mtext></mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:msub><mml:mi>t</mml:mi><mml:mrow><mml:mrow><mml:mtext>model</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:msub><mml:mi>t</mml:mi><mml:mrow><mml:mrow><mml:mtext>IoT</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo stretchy="false">)</mml:mo><mml:mo>,</mml:mo></mml:mtd></mml:mtr></mml:mtable></mml:math></disp-formula></p>
<p>where <inline-formula id="ieqn-162"><mml:math id="mml-ieqn-162"><mml:msub><mml:mi>t</mml:mi><mml:mrow><mml:mtext>model</mml:mtext></mml:mrow></mml:msub></mml:math></inline-formula> and <inline-formula id="ieqn-163"><mml:math id="mml-ieqn-163"><mml:msub><mml:mi>t</mml:mi><mml:mrow><mml:mtext>IoT</mml:mtext></mml:mrow></mml:msub></mml:math></inline-formula> are the time cycles of the ANNDRA-IoT model and the IoT system, respectively, and <inline-formula id="ieqn-164"><mml:math id="mml-ieqn-164"><mml:mtext>Align</mml:mtext></mml:math></inline-formula> ensure their alignment.</p>
</sec>
<sec id="s3_5_2">
<label>3.5.2</label>
<title>Customization for Various IoT Applications</title>
<p>Customization is one of the building blocks to integrate ANNDRA-IoT into different IoT applications. Every IoT application has its unique features and requirements, and hence a tailored approach to its integration and realization. The customization process starts with selecting the relevant features for every tailored IoT application. Let <inline-formula id="ieqn-165"><mml:math id="mml-ieqn-165"><mml:msub><mml:mi>F</mml:mi><mml:mrow><mml:mtext>total</mml:mtext></mml:mrow></mml:msub></mml:math></inline-formula> represent the total set of features available in the ANNDRA-IoT model. The subset of characteristics <inline-formula id="ieqn-166"><mml:math id="mml-ieqn-166"><mml:msub><mml:mi>F</mml:mi><mml:mrow><mml:mtext>app</mml:mtext></mml:mrow></mml:msub></mml:math></inline-formula> for a specific application is selected based on its relevance and impact, formulated as:
<disp-formula id="eqn-49"><label>(49)</label><mml:math id="mml-eqn-49" display="block"><mml:mtable columnalign="right left right left right left right left right left right left" rowspacing="3pt" columnspacing="0em 2em 0em 2em 0em 2em 0em 2em 0em 2em 0em" displaystyle="true"><mml:mtr><mml:mtd><mml:msub><mml:mi>F</mml:mi><mml:mrow><mml:mrow><mml:mtext>app</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:mo fence="false" stretchy="false">{</mml:mo><mml:mi>f</mml:mi><mml:mo>&#x2208;</mml:mo><mml:msub><mml:mi>F</mml:mi><mml:mrow><mml:mrow><mml:mtext>total</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mrow><mml:mo stretchy="false">|</mml:mo></mml:mrow><mml:mrow><mml:mtext>Relevance</mml:mtext></mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mi>f</mml:mi><mml:mo>,</mml:mo><mml:mrow><mml:mtext>App</mml:mtext></mml:mrow><mml:mo stretchy="false">)</mml:mo><mml:mo>&gt;</mml:mo><mml:mi>&#x03C4;</mml:mi><mml:mo fence="false" stretchy="false">}</mml:mo><mml:mo>,</mml:mo></mml:mtd></mml:mtr></mml:mtable></mml:math></disp-formula></p>
<p>where <inline-formula id="ieqn-167"><mml:math id="mml-ieqn-167"><mml:mtext>Relevance</mml:mtext><mml:mo stretchy="false">(</mml:mo><mml:mi>f</mml:mi><mml:mo>,</mml:mo><mml:mtext>App</mml:mtext><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula> quantifies the importance of the feature <inline-formula id="ieqn-168"><mml:math id="mml-ieqn-168"><mml:mi>f</mml:mi></mml:math></inline-formula> for the application and <inline-formula id="ieqn-169"><mml:math id="mml-ieqn-169"><mml:mi>&#x03C4;</mml:mi></mml:math></inline-formula> is a threshold that determines the selection. The ANNDRA-IoT configuration model dynamically adjusts to the complexity and nature of the applied IoT. It includes the number of layers, units in the LSTM, and learning parameters. The dynamic configuration function for the application <inline-formula id="ieqn-170"><mml:math id="mml-ieqn-170"><mml:msub><mml:mi>C</mml:mi><mml:mrow><mml:mtext>dynamic</mml:mtext></mml:mrow></mml:msub></mml:math></inline-formula> is expressed as follows:
<disp-formula id="eqn-50"><label>(50)</label><mml:math id="mml-eqn-50" display="block"><mml:mtable columnalign="right left right left right left right left right left right left" rowspacing="3pt" columnspacing="0em 2em 0em 2em 0em 2em 0em 2em 0em 2em 0em" displaystyle="true"><mml:mtr><mml:mtd><mml:msub><mml:mi>C</mml:mi><mml:mrow><mml:mrow><mml:mtext>dynamic</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo stretchy="false">(</mml:mo><mml:msub><mml:mi>N</mml:mi><mml:mrow><mml:mrow><mml:mtext>lstm</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:msub><mml:mi>N</mml:mi><mml:mrow><mml:mrow><mml:mtext>layers</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:mi>&#x03B1;</mml:mi><mml:mo>,</mml:mo><mml:mrow><mml:mtext>App</mml:mtext></mml:mrow><mml:mo stretchy="false">)</mml:mo><mml:mo>=</mml:mo><mml:mrow><mml:mtext>Adjust</mml:mtext></mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:msub><mml:mi>N</mml:mi><mml:mrow><mml:mrow><mml:mtext>lstm</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:msub><mml:mi>N</mml:mi><mml:mrow><mml:mrow><mml:mtext>layers</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:mi>&#x03B1;</mml:mi><mml:mo>,</mml:mo><mml:mrow><mml:mtext>App</mml:mtext></mml:mrow><mml:mo stretchy="false">)</mml:mo><mml:mo>,</mml:mo></mml:mtd></mml:mtr></mml:mtable></mml:math></disp-formula></p>
<p>where <inline-formula id="ieqn-171"><mml:math id="mml-ieqn-171"><mml:msub><mml:mi>N</mml:mi><mml:mrow><mml:mtext>lstm</mml:mtext></mml:mrow></mml:msub></mml:math></inline-formula>, <inline-formula id="ieqn-172"><mml:math id="mml-ieqn-172"><mml:msub><mml:mi>N</mml:mi><mml:mrow><mml:mtext>layers</mml:mtext></mml:mrow></mml:msub></mml:math></inline-formula>, and <inline-formula id="ieqn-173"><mml:math id="mml-ieqn-173"><mml:mi>&#x03B1;</mml:mi></mml:math></inline-formula> are LSTM units, the number of layers, and the learning rate, respectively, and <inline-formula id="ieqn-174"><mml:math id="mml-ieqn-174"><mml:mtext>Adjust</mml:mtext></mml:math></inline-formula> the adjustment. The performance model has yet to be adjusted to the application for optimal performance loss through fine-tuning optimization. The optimization function <inline-formula id="ieqn-175"><mml:math id="mml-ieqn-175"><mml:msub><mml:mi>O</mml:mi><mml:mrow><mml:mtext>app</mml:mtext></mml:mrow></mml:msub></mml:math></inline-formula> is defined as:
<disp-formula id="eqn-51"><label>(51)</label><mml:math id="mml-eqn-51" display="block"><mml:mtable columnalign="right left right left right left right left right left right left" rowspacing="3pt" columnspacing="0em 2em 0em 2em 0em 2em 0em 2em 0em 2em 0em" displaystyle="true"><mml:mtr><mml:mtd><mml:msub><mml:mi>O</mml:mi><mml:mrow><mml:mrow><mml:mtext>app</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo stretchy="false">(</mml:mo><mml:msub><mml:mi>L</mml:mi><mml:mrow><mml:mrow><mml:mtext>loss</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:msub><mml:mi>M</mml:mi><mml:mrow><mml:mrow><mml:mtext>metrics</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:mrow><mml:mtext>App</mml:mtext></mml:mrow><mml:mo stretchy="false">)</mml:mo><mml:mo>=</mml:mo><mml:mrow><mml:mtext>Optimize</mml:mtext></mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:msub><mml:mi>L</mml:mi><mml:mrow><mml:mrow><mml:mtext>loss</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:msub><mml:mi>M</mml:mi><mml:mrow><mml:mrow><mml:mtext>metrics</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:mrow><mml:mtext>App</mml:mtext></mml:mrow><mml:mo stretchy="false">)</mml:mo><mml:mo>,</mml:mo></mml:mtd></mml:mtr></mml:mtable></mml:math></disp-formula></p>
<p>where <inline-formula id="ieqn-176"><mml:math id="mml-ieqn-176"><mml:msub><mml:mi>L</mml:mi><mml:mrow><mml:mtext>loss</mml:mtext></mml:mrow></mml:msub></mml:math></inline-formula> is the loss function, <inline-formula id="ieqn-177"><mml:math id="mml-ieqn-177"><mml:msub><mml:mi>M</mml:mi><mml:mrow><mml:mtext>metrics</mml:mtext></mml:mrow></mml:msub></mml:math></inline-formula> is a set of performance metrics, and <inline-formula id="ieqn-178"><mml:math id="mml-ieqn-178"><mml:mtext>Optimize</mml:mtext></mml:math></inline-formula> optimizes the parameters for IoT applications.</p>
</sec>
</sec>
</sec>
<sec id="s4">
<label>4</label>
<title>Experimental Simulation and Results</title>
<p>This section elaborates the evaluation of the ANNDRA-IoT model through the experimental simulations. The experimental simulations were conducted with the use of simulation of falling edge computing technology within the IoTSim-Edge simulator. To ensure the robustness of the ANNDRA-IoT system, objective and subjective performance evaluations were performed. Objective evaluations include quantitative metrics such as resource utilization efficiency, response time, system performance, load balance effectiveness, and latency. Subjective evaluations emphasize practical implications, demonstrating the system&#x2019;s effectiveness in addressing real-world challenges like dynamic resource allocation and scalability in IoT environments. Extensive simulations have been conducted against several cutting-edge approaches to demonstrate the superiority of ANNDRA-IoT in optimizing resource allocation. Specifically, we compared ANNDRA-IoT with the following models: DEELB [<xref ref-type="bibr" rid="ref-3">3</xref>], OSCAR [<xref ref-type="bibr" rid="ref-18">18</xref>], CNN-MBO [<xref ref-type="bibr" rid="ref-30">30</xref>] and AWPR-FOG [<xref ref-type="bibr" rid="ref-31">31</xref>].</p>
<sec id="s4_1">
<label>4.1</label>
<title>Simulation Setup</title>
<p>IoTSim-Edge simulator emulates the complex IoT ecosystem within the simulation environment. The basis of our training and testing stages comprised data from the TON_IoT Dataset, obtained from UNSW Research. The realization also utilizes IoTSim-Edge&#x2019;s API for integrating the model within the simulated IoT environment.</p>
</sec>
<sec id="s4_2">
<label>4.2</label>
<title>Performance Evaluation Metrics</title>
<p>This section discusses the key performance metrics to be used to assess the efficacy of the ANNDRA-IoT model in optimal resource allocation within IoT environments. This indicates that 100 training epochs of the ANNDRA-IoT model accuracy metric are tracked. In a comparative analysis, the internal accuracy of the ANNDRA-IoT model over time was benchmarked compared to four important models in this field, namely DEELB, AWPR-FOG, and OSCAR. At epoch 100, the ANNDRA-IoT model outperformed the competing models with a training accuracy of 0.976 and a validation accuracy of 0.968 as illustrated in <xref ref-type="table" rid="table-3">Table 3</xref>. In contrast, the DEELB model reported a training accuracy of 0.925 and a validation accuracy of 0.917, while the OSCAR model achieved a training accuracy of 0.902 and a validation accuracy of 0.895. The CNN-MBO model presented a training accuracy of 0.940 and a validation accuracy of 0.932, and the AWPR-FOG model showed a training accuracy of 0.950 and a validation accuracy of 0.942.</p>
<table-wrap id="table-3">
<label>Table 3</label>
<caption>
<title>Comparative analysis of accuracy and precision</title>
</caption>
<table>
<colgroup>
<col/>
<col/>
<col/>
<col/>
<col/>
</colgroup>
<thead>
<tr>
<th>Model</th>
<th colspan="2">Accuracy</th>
<th colspan="2">Precision</th>
</tr>
<tr>
<th></th>
<th>Training</th>
<th>Validation</th>
<th>Training</th>
<th>Validation</th>
</tr>
</thead>
<tbody>
<tr>
<td>ANNDRA-IoT</td>
<td>0.976</td>
<td>0.968</td>
<td>0.97</td>
<td>0.957</td>
</tr>
<tr>
<td>DEELB</td>
<td>0.925</td>
<td>0.917</td>
<td>0.89</td>
<td>0.88</td>
</tr>
<tr>
<td>OSCAR</td>
<td>0.902</td>
<td>0.895</td>
<td>0.85</td>
<td>0.83</td>
</tr>
<tr>
<td>CNN-MBO</td>
<td>0.940</td>
<td>0.932</td>
<td>0.91</td>
<td>0.90</td>
</tr>
<tr>
<td>AWPR-FOG</td>
<td>0.950</td>
<td>0.942</td>
<td>0.93</td>
<td>0.92</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>The precision and recall of the ANNDRA-IoT model were observed for the 100 training epochs. The precision and recall of ANNDRA-IoT were compared with other algorithms. It can be seen in <xref ref-type="table" rid="table-4">Table 4</xref> that upon completion of the training, the ANNDRA-IoT model exhibited a training precision value of 0.97 and a recall value of 0.96. The precision and recall of the ANNDRA-IoT model in the classification states were recorded as the model was trained over 100 training epochs to assess its classification efficacy. At the end of the training, the ANNDRA-IoT model achieved training and validation precision of 0.97 and 0.96, and recall of 0.96 and 0.96, surpassing the corresponding metrics of the algorithms compared as represented in <xref ref-type="table" rid="table-4">Table 4</xref>. The DEELB model was trained to achieve a precision of 0.89 and 0.88 and a recall of 0.87 and 0.86, for training and validation, respectively. OSCAR was trained and validated to reach a precision of 0.85 and 0.84 and a recall of 0.83 and 0.82, respectively. The CNN-MBO approach achieved a training precision of 0.91 and a validation precision of 0.90, a training recall of 0.90 and validation recall of 0.89. Finally, the AWPR-FOG model needed to achieve training precision of 0.93 and recall of 0.92, with corresponding validation measurements of 0.92 and 0.91.</p>
<table-wrap id="table-4">
<label>Table 4</label>
<caption>
<title>Comparative analysis of recall and F1 score</title>
</caption>
<table>
<colgroup>
<col/>
<col/>
<col/>
<col/>
<col/>
</colgroup>
<thead>
<tr>
<th>Model</th>
<th colspan="2">Recall</th>
<th colspan="2">F1 score</th>
</tr>
<tr>
<th></th>
<th>Training</th>
<th>Validation</th>
<th>Training</th>
<th>Validation</th>
</tr>
</thead>
<tbody>
<tr>
<td>ANNDRA-IoT</td>
<td>0.96</td>
<td>0.954</td>
<td>0.965</td>
<td>0.955</td>
</tr>
<tr>
<td>DEELB</td>
<td>0.87</td>
<td>0.86</td>
<td>0.88</td>
<td>0.87</td>
</tr>
<tr>
<td>OSCAR</td>
<td>0.84</td>
<td>0.82</td>
<td>0.84</td>
<td>0.83</td>
</tr>
<tr>
<td>CNN-MBO</td>
<td>0.90</td>
<td>0.89</td>
<td>0.91</td>
<td>0.90</td>
</tr>
<tr>
<td>AWPR-FOG</td>
<td>0.92</td>
<td>0.91</td>
<td>0.93</td>
<td>0.92</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>For benchmarking the performance of the ANNDRA-IoT model, the F1 score&#x2019;s performance was compared to that of DEELB, OSCAR, CNN-MBO, and AWPR-FOG, where this comparison was done against the F1 score at the last epoch, which is 100. Herein, the ANNDRA-IoT model has given the highest performance with 0.965 of the training F1 score and 0.955 of the validation F1 score.</p>
<p>In this comparison, the DEELB model reached 0.88 for a training F1 score and 0.87 for a validation F1 score according to [<xref ref-type="bibr" rid="ref-3">3</xref>]. Besides, OSCAR, which was proposed in [<xref ref-type="bibr" rid="ref-18">18</xref>], reported 0.84 for a training F1 score and 0.83 for a validation F1 score, while the CNN-MBO approach of [<xref ref-type="bibr" rid="ref-30">30</xref>] had 0.91 for a training F1 score and 0.90 for a validation F1 score. The last model, AWPR-FOG, proposed in [<xref ref-type="bibr" rid="ref-31">31</xref>] reached 0.93 F1 score during training, and its F1 score when validated was 0.92.</p>
</sec>
<sec id="s4_3">
<label>4.3</label>
<title>Resource Allocation Optimization Metrics</title>
<p>In a comprehensive way of assessing the effectiveness of ANNDRA-IoT as a framework to optimize resource allocation in IoT environments, a set of custom metrics is used, including efficiency, response time, and overall system performance.</p>
<sec id="s4_3_1">
<label>4.3.1</label>
<title>Resource Utilization Efficiency</title>
<p>Efficiency in resource utilization is one of the important metrics concerned with IoT systems; hence, a significant amount of performance analysis needs to be taken into consideration regarding variable load conditions. It was estimated that, when the load was low, the ANNDRA-IoT model gained an efficiency rate of 94%, which definitely outperformed the compared models: DEELB with 88%, OSCAR 85%, CNN-MBO 90%, and AWPR-FOG 92%. Thus, these numeric results depict that this model has great capability for the optimization of resources in under utilization conditions. Shown here in <xref ref-type="fig" rid="fig-2">Fig. 2</xref> are the performance results in different scenarios.</p>
<fig id="fig-2">
<label>Figure 2</label>
<caption>
<title>Load-varying efficiency comparison of IoT resource management models</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMES_61472-fig-2.tif"/>
</fig>
<p>In the case of the application of moderate load, ANNDRA-IoT maintained an efficiency of 92%, while DEELB achieved an efficiency of 86%, OSCAR similarly reached 83%, CNN-MBO recorded 88%, and AWPR-FOG recorded 90%. Finally, for increasing load conditions, the efficiency of the ANNDRA-IoT model was at 89%, well above that of DEELB at 84%, OSCAR at 81%, CNN-MBO at 85%, and AWPR-FOG at 87%, reflecting the capability of the model to manage resources in times of high load with much more efficiency. At peak load conditions, the ANNDRA-IoT model achieved an efficiency of 87%, exceeding the performance of DEELB (82%), OSCAR (79%), CNN-MBO (83%) and AWPR-FOG (85%), which demonstrated superior performance in resource management under maximum demand.</p>
</sec>
<sec id="s4_3_2">
<label>4.3.2</label>
<title>Resource Allocation Response Time</title>
<p>Resource allocation responsiveness time is one of the useful performance indices of a model under varied operational conditions in IoT systems for a useful decision. In idle scenarios, characterized by minimal resource demands, the ANNDRA-IoT model demonstrated a rapid response time of 20 ms (see <xref ref-type="fig" rid="fig-3">Fig. 3</xref>), significantly faster than DEELB (35 ms), OSCAR (40 ms), CNN-MBO (30 ms) and AWPR-FOG (28 ms).</p>
<fig id="fig-3">
<label>Figure 3</label>
<caption>
<title>Comparative analysis of resource allocation response times under varying operational scenarios</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMES_61472-fig-3.tif"/>
</fig>
<p>Although ANNDRA-IoT had a higher response time during high-demand situations, where resource allocation becomes more difficult, of 80 ms vs. DEELB, OSCAR, CNN-MBO, and AWPR-FOG, who had 100, 105, 90, and 95 ms. Finally, in the peak demand condition, which represents the testing point at both the resource and system limit, ANNDRA-IoT records a response time of 100 ms, overcoming DEELB (130 ms), OSCAR (135 ms), CNN-MBO (120 ms), and AWPR-FOG (115 ms).</p>
</sec>
<sec id="s4_3_3">
<label>4.3.3</label>
<title>System Throughput</title>
<p>This study computed the overall work handled by the IoT system under the operational scenarios considered, which inherently represent quite challenging and distinctly different conditions. However, the results are presented in <xref ref-type="fig" rid="fig-4">Fig. 4</xref>. In the idle scenario, where the system load was minimal, the throughput in the ANNDRA-IoT model was 1000 tasks per hour, much better than that of DEELB (850 tasks/h), OSCAR (800 tasks/h), CNN-MBO (900 tasks/h) and AWPR-FOG (920 tasks/h). In regular demands of operations, a moderate use scenario was observed through the throughput of the ANNDRA-IoT model at 2000 tasks per hour compared to DEELB (1700 tasks/h), OSCAR (1650 tasks/h), CNN-MBO (1800 tasks/h) and AWPR-FOG (1850 tasks/h).</p>
<fig id="fig-4">
<label>Figure 4</label>
<caption>
<title>Comparative system throughput analysis across various operational scenarios</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMES_61472-fig-4.tif"/>
</fig>
<p>The use of the system is very high, in such a way that the demands for this system increase. ANNDRA-IoT can handle a throughput of 3000 tasks per hour, which means that it is faster than DEELB (2600 tasks/h), OSCAR (2500 tasks/h), CNN-MBO (2800 tasks/h) and AWPR-FOG (2850 tasks/h). Under peak demand scenarios, i.e., the limits of the system being tested, the throughput arrived at for the ANNDRA-IoT model was 3500 tasks per hour against DEELB (3100 tasks/h), OSCAR (3000 tasks/h), CNN-MBO (3300 tasks/h), and AWPR-FOG (3200 tasks/h). In such conditions, the ANNDRA-IoT model registered a throughput of 4000 tasks per hour in a stress test scenario, leaving DEELB at 3500 tasks per hour, OSCAR at 3400 tasks per hour, and CNN-MBO at 3700 tasks per hour, while AWPR-FOG remained at 3600 tasks per hour. Finally, in the worst-case situation of an emergency scenario, with demands being both urgent and unexpected and that these demands reach a high volume, the ANNDRA-IoT throughput model in this work is 4500 tasks per hour, while that of DEELB is 3900 tasks/h, OSCAR is 3800 tasks/h, CNN-MBO is 4200 tasks/h, and AW.</p>
</sec>
<sec id="s4_3_4">
<label>4.3.4</label>
<title>Load Balancing Effectiveness</title>
<p>This study evaluated the performance of the ANNDRA-IoT model under four distinct operational scenarios: low utilization, average utilization, high utilization, and peak utilization, while the result of these is presented in <xref ref-type="fig" rid="fig-5">Fig. 5</xref>. The first low utilization scenario is implemented with minimal system load, the ANNDRA-IoT model achieved a load balancing efficiency of 95%, indicating its superior capability to evenly distribute work. This was significantly higher than DEELB (87%), OSCAR (85%), CNN-MBO (90%), and AWPR-FOG (88%), demonstrating ANNDRA-IoT&#x2019;s advanced load management under underutilized conditions. In addition, in the average utilization scenario that represents regular operational demands, the ANNDRA-IoT model maintained a load balancing efficiency of 92%, outperforming DEELB (84%), OSCAR (80%), CNN-MBO (86%) and AWPR-FOG (85%).</p>
<fig id="fig-5">
<label>Figure 5</label>
<caption>
<title>Comparative load balancing effectiveness across various utilization scenarios</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMES_61472-fig-5.tif"/>
</fig>
<p>In a high utilization scenario implemented under increased demands, where effective load balancing becomes more challenging, ANNDRA-IoT showcased an efficiency of 89%. In comparison, DEELB recorded 82%, OSCAR 78%, CNN-MBO 83%, and AWPR-FOG 81%. Upon further evaluation of performance, another scenario is implemented named the Peak Utilization Scenario. During peak utilization tests, the ANNDRA-IoT model demonstrated its exceptional load balancing capability with an efficiency of 87%, surpassing DEELB (79%), OSCAR (75%), CNN-MBO (81%) and AWPR-FOG (80%).</p>
</sec>
<sec id="s4_3_5">
<label>4.3.5</label>
<title>Latency Analysis</title>
<p>The latency performance of the ANNDRA-IoT model was compared to DEELB, OSCAR, CNN-MBO, and AWPR-FOG in four distinct scenarios. A baseline scenario was established without the ANNDRA-IoT model to highlight its impact on system latency. The results for each scenario are presented below:
<list list-type="bullet">
<list-item>
<p><bold>Idle Environment:</bold> In scenarios with minimal resource demand, ANNDRA-IoT demonstrated a latency of <bold>10 ms</bold>, outperforming DEELB (18 ms), OSCAR (22 ms), CNN-MBO (15 ms), and AWPR-FOG (12 ms). Without ANNDRA-IoT, the system latency increased to <bold>25 ms</bold>.</p></list-item>
<list-item>
<p><bold>Normal Operations:</bold> During typical operations, ANNDRA-IoT maintained a latency of <bold>15 ms</bold>, significantly lower than DEELB (25 ms), OSCAR (28 ms), CNN-MBO (22 ms), and AWPR-FOG (20 ms). In systems without ANNDRA-IoT, the latency rose to <bold>30 ms</bold>.</p></list-item>
<list-item>
<p><bold>High Demand:</bold> Under conditions of high demand, ANNDRA-IoT achieved a latency of <bold>25 ms</bold>, compared to DEELB (35 ms), OSCAR (40 ms), CNN-MBO (30 ms), and AWPR-FOG (28 ms). Systems without ANNDRA-IoT recorded a latency of <bold>45 ms</bold>.</p></list-item>
<list-item>
<p><bold>Peak Demand:</bold> During peak demand scenarios, ANNDRA-IoT maintained a latency of <bold>40 ms</bold>, outperforming DEELB (50 ms), OSCAR (55 ms), CNN-MBO (45 ms), and AWPR-FOG (42 ms). Systems without ANNDRA-IoT exhibited a latency of <bold>60 ms</bold>.</p></list-item>
</list></p>
<p><xref ref-type="fig" rid="fig-6">Fig. 6</xref> depicts the outcome in these four scenarios that demonstrates the adaptability and efficiency of the ANNDRA-IoT model in diverse operational environments. These results validate the ANNDRA-IoT model as a superior solution for the allocation of real-time IoT resources.</p>
<fig id="fig-6">
<label>Figure 6</label>
<caption>
<title>Comparative load balancing effectiveness across various utilization scenarios</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMES_61472-fig-6a.tif"/>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMES_61472-fig-6b.tif"/>
</fig>
</sec>
</sec>
</sec>
<sec id="s5">
<label>5</label>
<title>Discussion</title>
<p>The proposed ANNDRA-IoT model is a novel architecture based on adaptive neural networks that addresses the complexities and dynamic nature of IoT environments. The adaptive approach employed by ANNDRA-IoT facilitates optimal resource distribution, ensuring efficient utilization while minimizing latency and improving overall system throughput. The key to this approach is its ability to intelligently interpret and respond to different IoT scenarios, thus boosting the performance and reliability of IoT systems. The implementation of LSTM-based neural networks for IoT resource management faces several key challenges. The large-scale data collection and processing carried out by these models poses a potential threat to data privacy, necessitating the development of privacy-preserving mechanisms.</p>
<p>Our simulation results demonstrate that ANNDRA-IoT outperforms state-of-the-art solutions such as DEELB, OSCAR, CNN-MBO, and AWPR-FOG. For example, ANNDRA-IoT achieves 95% efficiency in highly loaded scenarios, a significant improvement over DEELB&#x2019;s 87% and OSCAR&#x2019;s 85%. In terms of latency reductions, the proposed model reduces latency to 15 ms, as opposed to 22 ms in CNN-MBO and 20 ms in AWPR-FOG. These results demonstrate not only the effectiveness of ANNDRA-IoT in diverse operational conditions but also its potential to revolutionize IoT resource management.</p>
<p>The possible future expansion would be the incorporation of state-of-the-art machine learning algorithms for predictive analytics, allowing the model to predict future resource requirements based on trends in historical data. In addition, research for the incorporation of some edge computing paradigms may enhance the processing power of the model to capture, trace, and retrieve the nearest possible data from its source, reducing latency further with an exceptionally superfast decision-making processes&#x2019; speed.</p>
</sec>
<sec id="s6">
<label>6</label>
<title>Conclusion</title>
<p>This paper introduces the ANNDRA-IoT model that provides a significant improvement in resource allocation in environmental settings of the IoT. The ANNDRA-IoT model effectively combats the complex and dynamic natures associated with IoT systems through its innovative neural network-based architecture. The implementation of the model has led to many achievements in improving system performance. ANNNORA-IoT lowered latency to 15 ms in simulation scenarios as compared to CNN-MBO&#x2019;s 22 ms and AWPR-FOG&#x2019;s 20 ms. The efficiency in resource utilization under low utilization scenarios hit peaks at 95% with DEELB only at 87% and OSCAR only at 85%. Moreover, the throughput of the system with ANNDRA-IoT has been measured in high-demand scenarios that were 3000 tasks per hour, better than the DEELB and OSCAR results of 2600 tasks/h and 2500 tasks/h, respectively. The efficiency in load balancing was also superior in high utilization scenarios and registered an efficiency 89% compared to DEELB 82% and OSCAR 78%. The primary limitations of this study include the computational complexity of implementing LSTM networks on resource-constrained devices. Future extension of the proposed approach can include more diversity in the data set to increase efficiency in resource allocation.</p>
</sec>
</body>
<back>
<ack>
<p>None.</p>
</ack>
<sec>
<title>Funding Statement</title>
<p>The authors gratefully acknowledge the funding of the Deanship of Graduate Studies and Scientific Research, Jazan University, Saudi Arabia, through Project Number: ISP-2024.</p>
</sec>
<sec>
<title>Author Contributions</title>
<p>The authors confirm contributions to the paper as follows: study conception and design: Abdullah M. Alqahtani, Kamran Ahmad Awan; data collection: Kamran Ahmad Awan, Abdulaziz Almaleh; analysis and interpretation of results: Abdullah M. Alqahtani, Kamran Ahmad Awan, Osama Aletri; draft manuscript preparation: Kamran Ahmad Awan, Osama Aletri. All authors reviewed the results and approved the final version of the manuscript.</p>
</sec>
<sec sec-type="data-availability">
<title>Availability of Data and Materials</title>
<p>The data used in this study is derived from the publicly available TON_IoT Dataset, which can be accessed at <ext-link ext-link-type="uri" xlink:href="https://research.unsw.edu.au/projects/toniot-datasets">The TON_IoT Datasets</ext-link> (accessed on 29 January 2025). The code utilized for this research is currently part of ongoing work and will be made available upon request to maintain the integrity and progress of the research.</p>
</sec>
<sec>
<title>Ethics Approval</title>
<p>Not applicable.</p>
</sec>
<sec sec-type="COI-statement">
<title>Conflicts of Interest</title>
<p>The authors declare no conflicts of interest to report regarding the present study.</p>
</sec>
<ref-list content-type="authoryear">
<title>References</title>
<ref id="ref-1"><label>[1]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Zaidi</surname> <given-names>T</given-names></string-name>, <string-name><surname>Usman</surname> <given-names>M</given-names></string-name>, <string-name><surname>Aftab</surname> <given-names>MU</given-names></string-name>, <string-name><surname>Aljuaid</surname> <given-names>H</given-names></string-name>, <string-name><surname>Ghadi</surname> <given-names>YY</given-names></string-name></person-group>. <article-title>Fabrication of flexible role-based access control based on blockchain for Internet of Things use cases</article-title>. <source>IEEE Access</source>. <year>2023</year>;<volume>11</volume>:<fpage>106315</fpage>&#x2013;<lpage>33</lpage>. doi:<pub-id pub-id-type="doi">10.1109/ACCESS.2023.3318487</pub-id>.</mixed-citation></ref>
<ref id="ref-2"><label>[2]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Ahmed</surname> <given-names>SF</given-names></string-name>, <string-name><surname>Alam</surname> <given-names>MSB</given-names></string-name>, <string-name><surname>Afrin</surname> <given-names>S</given-names></string-name>, <string-name><surname>Rafa</surname> <given-names>SJ</given-names></string-name>, <string-name><surname>Taher</surname> <given-names>SB</given-names></string-name>, <string-name><surname>Kabir</surname> <given-names>M</given-names></string-name>, <etal>et al</etal></person-group>. <article-title>Towards a secure 5G-enabled Internet of Things: a survey on requirements, privacy, security, challenges, and opportunities</article-title>. <source>IEEE Access</source>. <year>2024</year>;<volume>12</volume>(<issue>8</issue>):<fpage>13125</fpage>&#x2013;<lpage>45</lpage>. doi:<pub-id pub-id-type="doi">10.1109/ACCESS.2024.3352508</pub-id>.</mixed-citation></ref>
<ref id="ref-3"><label>[3]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Shuaib</surname> <given-names>M</given-names></string-name>, <string-name><surname>Bhatia</surname> <given-names>S</given-names></string-name>, <string-name><surname>Alam</surname> <given-names>S</given-names></string-name>, <string-name><surname>Masih</surname> <given-names>RK</given-names></string-name>, <string-name><surname>Alqahtani</surname> <given-names>N</given-names></string-name>, <string-name><surname>Basheer</surname> <given-names>S</given-names></string-name>, <etal>et al</etal></person-group>. <article-title>An optimized, dynamic, and efficient load-balancing framework for resource management in the Internet of Things (IoT) environment</article-title>. <source>Electronics</source>. <year>2023</year>;<volume>12</volume>(<issue>5</issue>):<fpage>1104</fpage>. doi:<pub-id pub-id-type="doi">10.3390/electronics12051104</pub-id>.</mixed-citation></ref>
<ref id="ref-4"><label>[4]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Zhang</surname> <given-names>Y</given-names></string-name>, <string-name><surname>He</surname> <given-names>D</given-names></string-name>, <string-name><surname>Vijayakumar</surname> <given-names>P</given-names></string-name>, <string-name><surname>Luo</surname> <given-names>M</given-names></string-name>, <string-name><surname>Huang</surname> <given-names>X</given-names></string-name></person-group>. <article-title>SAPFS: an efficient symmetric-key authentication key agreement scheme with perfect forward secrecy for industrial internet of things</article-title>. <source>IEEE Internet Things J</source>. <year>2023</year>;<volume>10</volume>(<issue>11</issue>):<fpage>9716</fpage>&#x2013;<lpage>26</lpage>. doi:<pub-id pub-id-type="doi">10.1109/JIOT.2023.3234178</pub-id>.</mixed-citation></ref>
<ref id="ref-5"><label>[5]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Mowla</surname> <given-names>MN</given-names></string-name>, <string-name><surname>Mowla</surname> <given-names>N</given-names></string-name>, <string-name><surname>Shah</surname> <given-names>AS</given-names></string-name>, <string-name><surname>Rabie</surname> <given-names>K</given-names></string-name>, <string-name><surname>Shongwe</surname> <given-names>T</given-names></string-name></person-group>. <article-title>Internet of Things and wireless sensor networks for smart agriculture applications: a survey</article-title>. <source>IEEE Access</source>. <year>2023</year>;<volume>11</volume>(<issue>2</issue>):<fpage>145813</fpage>&#x2013;<lpage>52</lpage>. doi:<pub-id pub-id-type="doi">10.1109/ACCESS.2023.3346299</pub-id>.</mixed-citation></ref>
<ref id="ref-6"><label>[6]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Bakar</surname> <given-names>KA</given-names></string-name>, <string-name><surname>Zuhra</surname> <given-names>FT</given-names></string-name>, <string-name><surname>Isyaku</surname> <given-names>B</given-names></string-name>, <string-name><surname>Sulaiman</surname> <given-names>SB</given-names></string-name></person-group>. <article-title>A review on the immediate advancement of the Internet of Things in wireless telecommunications</article-title>. <source>IEEE Access</source>. <year>2023</year>;<volume>11</volume>(<issue>70</issue>):<fpage>21020</fpage>&#x2013;<lpage>48</lpage>. doi:<pub-id pub-id-type="doi">10.1109/ACCESS.2023.3250466</pub-id>.</mixed-citation></ref>
<ref id="ref-7"><label>[7]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Ara&#x00FA;jo</surname> <given-names>SO</given-names></string-name>, <string-name><surname>Peres</surname> <given-names>RS</given-names></string-name>, <string-name><surname>Filipe</surname> <given-names>L</given-names></string-name>, <string-name><surname>Manta-Costa</surname> <given-names>A</given-names></string-name>, <string-name><surname>Lidon</surname> <given-names>F</given-names></string-name>, <string-name><surname>Ramalho</surname> <given-names>JC</given-names></string-name>, <etal>et al.</etal></person-group> <article-title>Intelligent data-driven decision support for agricultural systems-ID3SAS</article-title>. <source>IEEE Access</source>. <year>2023</year>;<volume>11</volume>:<fpage>115798</fpage>&#x2013;<lpage>815</lpage>. doi:<pub-id pub-id-type="doi">10.1109/ACCESS.2023.3324813</pub-id>.</mixed-citation></ref>
<ref id="ref-8"><label>[8]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Zhang</surname> <given-names>F</given-names></string-name>, <string-name><surname>Han</surname> <given-names>G</given-names></string-name>, <string-name><surname>Li</surname> <given-names>A</given-names></string-name>, <string-name><surname>Lin</surname> <given-names>C</given-names></string-name>, <string-name><surname>Liu</surname> <given-names>L</given-names></string-name>, <string-name><surname>Zhang</surname> <given-names>Y</given-names></string-name>, <etal>et al</etal></person-group>. <article-title>QoS-driven distributed cooperative data offloading and heterogeneous resource scheduling for IIoT</article-title>. <source>IEEE Internet Things Mag</source>. <year>2023</year>;<volume>6</volume>(<issue>3</issue>):<fpage>118</fpage>&#x2013;<lpage>24</lpage>. doi:<pub-id pub-id-type="doi">10.1109/IOTM.001.2200264</pub-id>.</mixed-citation></ref>
<ref id="ref-9"><label>[9]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Singh</surname> <given-names>M</given-names></string-name>, <string-name><surname>Sahoo</surname> <given-names>KS</given-names></string-name>, <string-name><surname>Gandomi</surname> <given-names>AH</given-names></string-name></person-group>. <article-title>An intelligent IoT-based data analytics for freshwater recirculating aquaculture system</article-title>. <source>IEEE Internet Things J</source>. <year>2023</year>;<volume>11</volume>(<issue>3</issue>):<fpage>4206</fpage>&#x2013;<lpage>17</lpage>. doi:<pub-id pub-id-type="doi">10.1109/JIOT.2023.3298844</pub-id>.</mixed-citation></ref>
<ref id="ref-10"><label>[10]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Singh</surname> <given-names>SK</given-names></string-name>, <string-name><surname>Kumar</surname> <given-names>M</given-names></string-name>, <string-name><surname>Tanwar</surname> <given-names>S</given-names></string-name>, <string-name><surname>Park</surname> <given-names>JH</given-names></string-name></person-group>. <article-title>GRU-based digital twin framework for data allocation and storage in IoT-enabled smart home networks</article-title>. <source>Future Gener Comput Syst</source>. <year>2024</year>;<volume>153</volume>(<issue>1</issue>):<fpage>391</fpage>&#x2013;<lpage>402</lpage>. doi:<pub-id pub-id-type="doi">10.1016/j.future.2023.12.009</pub-id>.</mixed-citation></ref>
<ref id="ref-11"><label>[11]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Xu</surname> <given-names>A</given-names></string-name>, <string-name><surname>Hu</surname> <given-names>Z</given-names></string-name>, <string-name><surname>Zhang</surname> <given-names>X</given-names></string-name>, <string-name><surname>Xiao</surname> <given-names>H</given-names></string-name>, <string-name><surname>Zheng</surname> <given-names>H</given-names></string-name>, <string-name><surname>Chen</surname> <given-names>B</given-names></string-name>, <etal>et al</etal></person-group>. <article-title>QDRL: queue-aware online DRL for computation offloading in industrial Internet of Things</article-title>. <source>IEEE Internet Things J</source>. <year>2023</year>;<volume>11</volume>(<issue>5</issue>):<fpage>7772</fpage>&#x2013;<lpage>86</lpage>. doi:<pub-id pub-id-type="doi">10.1109/JIOT.2023.3316139</pub-id>.</mixed-citation></ref>
<ref id="ref-12"><label>[12]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Jeribi</surname> <given-names>F</given-names></string-name>, <string-name><surname>Amin</surname> <given-names>R</given-names></string-name>, <string-name><surname>Alhameed</surname> <given-names>M</given-names></string-name>, <string-name><surname>Tahir</surname> <given-names>A</given-names></string-name></person-group>. <article-title>An efficient trust management technique using ID3 algorithm with blockchain in smart buildings IoT</article-title>. <source>IEEE Access</source>. <year>2022</year>;<volume>11</volume>:<fpage>8136</fpage>&#x2013;<lpage>49</lpage>. doi:<pub-id pub-id-type="doi">10.1109/ACCESS.2022.3230944</pub-id>.</mixed-citation></ref>
<ref id="ref-13"><label>[13]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Zhang</surname> <given-names>F</given-names></string-name>, <string-name><surname>Han</surname> <given-names>G</given-names></string-name>, <string-name><surname>Liu</surname> <given-names>L</given-names></string-name>, <string-name><surname>Zhang</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Peng</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Li</surname> <given-names>C</given-names></string-name></person-group>. <article-title>Cooperative partial task offloading and resource allocation for IIoT based on decentralized multi-agent deep reinforcement learning</article-title>. <source>IEEE Internet Things J</source>. <year>2023</year>;<volume>11</volume>(<issue>3</issue>):<fpage>5526</fpage>&#x2013;<lpage>44</lpage>. doi:<pub-id pub-id-type="doi">10.1109/JIOT.2023.3306803</pub-id>.</mixed-citation></ref>
<ref id="ref-14"><label>[14]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Khan</surname> <given-names>D</given-names></string-name>, <string-name><surname>Alshahrani</surname> <given-names>A</given-names></string-name>, <string-name><surname>Almjally</surname> <given-names>A</given-names></string-name>, <string-name><surname>Al Mudawi</surname> <given-names>N</given-names></string-name>, <string-name><surname>Algarni</surname> <given-names>A</given-names></string-name>, <string-name><surname>Al Nowaiser</surname> <given-names>K</given-names></string-name>, <etal>et al</etal></person-group>. <article-title>Advanced IoT-based human activity recognition and localization using deep polynomial neural network</article-title>. <source>IEEE Access</source>. <year>2024</year>;<volume>12</volume>:<fpage>94337</fpage>&#x2013;<lpage>53</lpage>. doi:<pub-id pub-id-type="doi">10.1109/ACCESS.2024.3420752</pub-id>.</mixed-citation></ref>
<ref id="ref-15"><label>[15]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Minhaj</surname> <given-names>SU</given-names></string-name>, <string-name><surname>Mahmood</surname> <given-names>A</given-names></string-name>, <string-name><surname>Abedin</surname> <given-names>SF</given-names></string-name>, <string-name><surname>Hassan</surname> <given-names>SA</given-names></string-name>, <string-name><surname>Bhatti</surname> <given-names>MT</given-names></string-name>, <string-name><surname>Ali</surname> <given-names>SH</given-names></string-name>, <etal>et al</etal></person-group>. <article-title>Intelligent resource allocation in LoRaWAN using machine learning techniques</article-title>. <source>IEEE Access</source>. <year>2023</year>;<volume>11</volume>(<issue>4</issue>):<fpage>10092</fpage>&#x2013;<lpage>106</lpage>. doi:<pub-id pub-id-type="doi">10.1109/ACCESS.2023.3240308</pub-id>.</mixed-citation></ref>
<ref id="ref-16"><label>[16]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>George</surname> <given-names>A</given-names></string-name>, <string-name><surname>Ravindran</surname> <given-names>A</given-names></string-name>, <string-name><surname>Mendieta</surname> <given-names>M</given-names></string-name>, <string-name><surname>Tabkhi</surname> <given-names>H</given-names></string-name></person-group>. <article-title>Mez: an adaptive messaging system for latency-sensitive multi-camera machine vision at the IoT edge</article-title>. <source>IEEE Access</source>. <year>2021</year>;<volume>9</volume>:<fpage>21457</fpage>&#x2013;<lpage>73</lpage>. doi:<pub-id pub-id-type="doi">10.1109/ACCESS.2021.3055775</pub-id>.</mixed-citation></ref>
<ref id="ref-17"><label>[17]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Zou</surname> <given-names>S</given-names></string-name>, <string-name><surname>Wu</surname> <given-names>J</given-names></string-name>, <string-name><surname>Yu</surname> <given-names>H</given-names></string-name>, <string-name><surname>Wang</surname> <given-names>W</given-names></string-name>, <string-name><surname>Huang</surname> <given-names>L</given-names></string-name>, <string-name><surname>Ni</surname> <given-names>W</given-names></string-name>, <etal>et al</etal></person-group>. <article-title>Efficiency-optimized 6G: a virtual network resource orchestration strategy by enhanced particle swarm optimization</article-title>. <source>Dig Commun Netw</source>. <year>2024</year>;<volume>10</volume>(<issue>5</issue>):<fpage>1221</fpage>&#x2013;<lpage>33</lpage>. doi:<pub-id pub-id-type="doi">10.1016/j.dcan.2023.06.008</pub-id>.</mixed-citation></ref>
<ref id="ref-18"><label>[18]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Wadhwa</surname> <given-names>H</given-names></string-name>, <string-name><surname>Aron</surname> <given-names>R</given-names></string-name></person-group>. <article-title>Optimized task scheduling and preemption for distributed resource management in fog-assisted IoT environment</article-title>. <source>J Supercomput</source>. <year>2023</year>;<volume>79</volume>(<issue>2</issue>):<fpage>2212</fpage>&#x2013;<lpage>50</lpage>. doi:<pub-id pub-id-type="doi">10.1007/s11227-022-04747-2</pub-id>.</mixed-citation></ref>
<ref id="ref-19"><label>[19]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Peng</surname> <given-names>M</given-names></string-name>, <string-name><surname>Zhang</surname> <given-names>K</given-names></string-name></person-group>. <article-title>Recent advances in fog radio access networks: performance analysis and radio resource allocation</article-title>. <source>IEEE Access</source>. <year>2016</year>;<volume>4</volume>:<fpage>5003</fpage>&#x2013;<lpage>9</lpage>. doi:<pub-id pub-id-type="doi">10.1109/ACCESS.2016.2603996</pub-id>.</mixed-citation></ref>
<ref id="ref-20"><label>[20]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Park</surname> <given-names>H</given-names></string-name>, <string-name><surname>Kim</surname> <given-names>N</given-names></string-name>, <string-name><surname>Lee</surname> <given-names>GH</given-names></string-name>, <string-name><surname>Choi</surname> <given-names>JK</given-names></string-name></person-group>. <article-title>MultiCNN-FilterLSTM: resource-efficient sensor-based human activity recognition in IoT applications</article-title>. <source>Future Gener Comput Syst</source>. <year>2023</year>;<volume>139</volume>(<issue>15</issue>):<fpage>196</fpage>&#x2013;<lpage>209</lpage>. doi:<pub-id pub-id-type="doi">10.1016/j.future.2022.09.024</pub-id>.</mixed-citation></ref>
<ref id="ref-21"><label>[21]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Walia</surname> <given-names>GK</given-names></string-name>, <string-name><surname>Kumar</surname> <given-names>M</given-names></string-name>, <string-name><surname>Gill</surname> <given-names>SS</given-names></string-name></person-group>. <article-title>AI-empowered fog/edge resource management for IoT applications: a comprehensive review, research challenges and future perspectives</article-title>. <source>IEEE Commun Surv Tutor</source>. <year>2023</year>;<volume>26</volume>(<issue>1</issue>):<fpage>619</fpage>&#x2013;<lpage>69</lpage>. doi:<pub-id pub-id-type="doi">10.1109/COMST.2023.3338015</pub-id>.</mixed-citation></ref>
<ref id="ref-22"><label>[22]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Xu</surname> <given-names>M</given-names></string-name></person-group>. <article-title>A novel machine learning-based framework for channel bandwidth allocation and optimization in distributed computing environments</article-title>. <source>EURASIP J Wirel Commun Netw</source>. <year>2023</year>;<volume>2023</volume>(<issue>1</issue>):<fpage>97</fpage>. doi:<pub-id pub-id-type="doi">10.1186/s13638-023-02310-y</pub-id>.</mixed-citation></ref>
<ref id="ref-23"><label>[23]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Ke</surname> <given-names>H</given-names></string-name>, <string-name><surname>Wang</surname> <given-names>J</given-names></string-name>, <string-name><surname>Wang</surname> <given-names>H</given-names></string-name>, <string-name><surname>Ge</surname> <given-names>Y</given-names></string-name></person-group>. <article-title>Joint optimization of data offloading and resource allocation with renewable energy aware for IoT devices: a deep reinforcement learning approach</article-title>. <source>IEEE Access</source>. <year>2019</year>;<volume>7</volume>:<fpage>179349</fpage>&#x2013;<lpage>63</lpage>. doi:<pub-id pub-id-type="doi">10.1109/ACCESS.2019.2959348</pub-id>.</mixed-citation></ref>
<ref id="ref-24"><label>[24]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Singh</surname> <given-names>J</given-names></string-name>, <string-name><surname>Singh</surname> <given-names>P</given-names></string-name>, <string-name><surname>Hedabou</surname> <given-names>M</given-names></string-name>, <string-name><surname>Kumar</surname> <given-names>N</given-names></string-name></person-group>. <article-title>An efficient machine learning-based resource allocation scheme for SDN-enabled fog computing environment</article-title>. <source>IEEE Trans Veh Technol</source>. <year>2023</year>;<volume>72</volume>(<issue>6</issue>):<fpage>8004</fpage>&#x2013;<lpage>17</lpage>. doi:<pub-id pub-id-type="doi">10.1109/TVT.2023.3242585</pub-id>.</mixed-citation></ref>
<ref id="ref-25"><label>[25]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Otoshi</surname> <given-names>T</given-names></string-name>, <string-name><surname>Murata</surname> <given-names>M</given-names></string-name>, <string-name><surname>Shimonishi</surname> <given-names>H</given-names></string-name>, <string-name><surname>Shimokawa</surname> <given-names>T</given-names></string-name></person-group>. <article-title>Hierarchical Bayesian attractor model for dynamic task allocation in edge-cloud computing</article-title>. In: <conf-name>2023 International Conference on Computing, Networking and Communications (ICNC)</conf-name>; <year>2023</year>;<publisher-loc>Honolulu, HI, USA</publisher-loc>. p. <fpage>12</fpage>&#x2013;<lpage>8</lpage>.</mixed-citation></ref>
<ref id="ref-26"><label>[26]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Liu</surname> <given-names>L</given-names></string-name>, <string-name><surname>Yuan</surname> <given-names>X</given-names></string-name>, <string-name><surname>Chen</surname> <given-names>D</given-names></string-name>, <string-name><surname>Zhang</surname> <given-names>N</given-names></string-name>, <string-name><surname>Sun</surname> <given-names>H</given-names></string-name>, <string-name><surname>Taherkordi</surname> <given-names>A</given-names></string-name></person-group>. <article-title>Multi-user dynamic computation offloading and resource allocation in 5G MEC heterogeneous networks with static and dynamic subchannels</article-title>. <source>IEEE Trans Veh Technol</source>. <year>2023</year>;<volume>72</volume>(<issue>11</issue>):<fpage>14924</fpage>&#x2013;<lpage>38</lpage>. doi:<pub-id pub-id-type="doi">10.1109/TVT.2023.3285069</pub-id>.</mixed-citation></ref>
<ref id="ref-27"><label>[27]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Fan</surname> <given-names>W</given-names></string-name>, <string-name><surname>Liu</surname> <given-names>X</given-names></string-name>, <string-name><surname>Yuan</surname> <given-names>H</given-names></string-name>, <string-name><surname>Li</surname> <given-names>N</given-names></string-name>, <string-name><surname>Liu</surname> <given-names>Y</given-names></string-name></person-group>. <article-title>Time-slotted task offloading and resource allocation for cloud-edge-end cooperative computing networks</article-title>. <source>IEEE Trans Mob Comput</source>. <year>2024</year>;<volume>23</volume>(<issue>8</issue>):<fpage>8225</fpage>&#x2013;<lpage>41</lpage>. doi:<pub-id pub-id-type="doi">10.1109/TMC.2024.3349551</pub-id>.</mixed-citation></ref>
<ref id="ref-28"><label>[28]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Liu</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Wang</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Shen</surname> <given-names>Y</given-names></string-name></person-group>. <article-title>Delay Doppler division multiple access resource allocation in aircraft network</article-title>. <source>IEEE Internet Things J</source>. <year>2024</year>;<volume>11</volume>(<issue>17</issue>):<fpage>27881</fpage>&#x2013;<lpage>93</lpage>. doi:<pub-id pub-id-type="doi">10.1109/JIOT.2024.3352030</pub-id>.</mixed-citation></ref>
<ref id="ref-29"><label>[29]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Ortiz</surname> <given-names>F</given-names></string-name>, <string-name><surname>Skatchkovsky</surname> <given-names>N</given-names></string-name>, <string-name><surname>Lagunas</surname> <given-names>E</given-names></string-name>, <string-name><surname>Martins</surname> <given-names>WA</given-names></string-name>, <string-name><surname>Eappen</surname> <given-names>G</given-names></string-name>, <string-name><surname>Daoud</surname> <given-names>S</given-names></string-name>, <etal>et al</etal></person-group>. <article-title>Energy-efficient on-board radio resource management for satellite communications via neuromorphic computing</article-title>. <source>IEEE Trans Mach Learn Commun Netw</source>. <year>2024</year>;<volume>2</volume>:<fpage>169</fpage>&#x2013;<lpage>89</lpage>. doi:<pub-id pub-id-type="doi">10.1109/TMLCN.2024.3352569</pub-id>.</mixed-citation></ref>
<ref id="ref-30"><label>[30]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Badri</surname> <given-names>S</given-names></string-name>, <string-name><surname>Alghazzawi</surname> <given-names>DM</given-names></string-name>, <string-name><surname>Hasan</surname> <given-names>SH</given-names></string-name>, <string-name><surname>Alfayez</surname> <given-names>F</given-names></string-name>, <string-name><surname>Hasan</surname> <given-names>SH</given-names></string-name>, <string-name><surname>Rahman</surname> <given-names>M</given-names></string-name>, <etal>et al</etal></person-group>. <article-title>An efficient and secure model using adaptive optimal deep learning for task scheduling in cloud computing</article-title>. <source>Electronics</source>. <year>2023</year>;<volume>12</volume>(<issue>6</issue>):<fpage>1441</fpage>. doi:<pub-id pub-id-type="doi">10.3390/electronics12061441</pub-id>.</mixed-citation></ref>
<ref id="ref-31"><label>[31]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Kumar</surname> <given-names>M</given-names></string-name>, <string-name><surname>Kishor</surname> <given-names>A</given-names></string-name>, <string-name><surname>Samariya</surname> <given-names>JK</given-names></string-name>, <string-name><surname>Zomaya</surname> <given-names>AY</given-names></string-name></person-group>. <article-title>An autonomic workload prediction and resource allocation framework for fog-enabled industrial IoT</article-title>. <source>IEEE Internet Things J</source>. <year>2023</year>;<volume>10</volume>(<issue>11</issue>):<fpage>9513</fpage>&#x2013;<lpage>22</lpage>. doi:<pub-id pub-id-type="doi">10.1109/JIOT.2023.3235107</pub-id>.</mixed-citation></ref>
<ref id="ref-32"><label>[32]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Baccour</surname> <given-names>E</given-names></string-name>, <string-name><surname>Mhaisen</surname> <given-names>N</given-names></string-name>, <string-name><surname>Abdellatif</surname> <given-names>AA</given-names></string-name>, <string-name><surname>Erbad</surname> <given-names>A</given-names></string-name>, <string-name><surname>Mohamed</surname> <given-names>A</given-names></string-name>, <string-name><surname>Hamdi</surname> <given-names>M</given-names></string-name>, <etal>et al</etal></person-group>. <article-title>Pervasive AI for IoT applications: a survey on resource-efficient distributed artificial intelligence</article-title>. <source>IEEE Commun Surv Tutor</source>. <year>2022</year>;<volume>24</volume>(<issue>4</issue>):<fpage>2366</fpage>&#x2013;<lpage>418</lpage>. doi:<pub-id pub-id-type="doi">10.1109/COMST.2022.3200740</pub-id>.</mixed-citation></ref>
<ref id="ref-33"><label>[33]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Kuthadi</surname> <given-names>VM</given-names></string-name>, <string-name><surname>Selvaraj</surname> <given-names>R</given-names></string-name>, <string-name><surname>Baskar</surname> <given-names>S</given-names></string-name>, <string-name><surname>Shakeel</surname> <given-names>PM</given-names></string-name>, <string-name><surname>Ranjan</surname> <given-names>A</given-names></string-name></person-group>. <article-title>Optimized energy management model on data distributing framework of wireless sensor network in IoT system</article-title>. <source>Wirel Pers Commun</source>. <year>2022</year>;<volume>127</volume>(<issue>2</issue>):<fpage>1377</fpage>&#x2013;<lpage>403</lpage>. doi:<pub-id pub-id-type="doi">10.1007/s11277-021-08583-0</pub-id>.</mixed-citation></ref>
<ref id="ref-34"><label>[34]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Mwase</surname> <given-names>C</given-names></string-name>, <string-name><surname>Jin</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Westerlund</surname> <given-names>T</given-names></string-name>, <string-name><surname>Tenhunen</surname> <given-names>H</given-names></string-name>, <string-name><surname>Zou</surname> <given-names>Z</given-names></string-name></person-group>. <article-title>Communication-efficient distributed AI strategies for the IoT edge</article-title>. <source>Future Gener Comput Syst</source>. <year>2022</year>;<volume>131</volume>(<issue>3</issue>):<fpage>292</fpage>&#x2013;<lpage>308</lpage>. doi:<pub-id pub-id-type="doi">10.1016/j.future.2022.01.013</pub-id>.</mixed-citation></ref>
<ref id="ref-35"><label>[35]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Chen</surname> <given-names>S</given-names></string-name>, <string-name><surname>Yang</surname> <given-names>C</given-names></string-name>, <string-name><surname>Huang</surname> <given-names>W</given-names></string-name>, <string-name><surname>Liang</surname> <given-names>W</given-names></string-name>, <string-name><surname>Ke</surname> <given-names>N</given-names></string-name>, <string-name><surname>Souri</surname> <given-names>A</given-names></string-name>, <etal>et al</etal></person-group>. <article-title>Fairness constraint efficiency optimization for multiresource allocation in a cluster system serving Internet of Things</article-title>. <source>Int J Commun Syst</source>. <year>2023</year>;<volume>36</volume>(<issue>3</issue>):<fpage>e5395</fpage>. doi:<pub-id pub-id-type="doi">10.1002/dac.5395</pub-id>.</mixed-citation></ref>
<ref id="ref-36"><label>[36]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Zare</surname> <given-names>M</given-names></string-name>, <string-name><surname>Sola</surname> <given-names>YE</given-names></string-name>, <string-name><surname>Hasanpour</surname> <given-names>H</given-names></string-name></person-group>. <article-title>Imperialist competitive based approach for efficient deployment of IoT services in fog computing</article-title>. <source>Cluster Comput</source>. <year>2023</year>;<volume>27</volume>:<fpage>1</fpage>&#x2013;<lpage>14</lpage>.</mixed-citation></ref>
<ref id="ref-37"><label>[37]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Salh</surname> <given-names>A</given-names></string-name>, <string-name><surname>Ngah</surname> <given-names>R</given-names></string-name>, <string-name><surname>Audah</surname> <given-names>L</given-names></string-name>, <string-name><surname>Kim</surname> <given-names>KS</given-names></string-name>, <string-name><surname>Abdullah</surname> <given-names>Q</given-names></string-name>, <string-name><surname>Al-Moliki</surname> <given-names>YM</given-names></string-name>, <etal>et al</etal></person-group>. <article-title>Energy-efficient federated learning with resource allocation for green IoT edge intelligence in B5G</article-title>. <source>IEEE Access</source>. <year>2023</year>;<volume>11</volume>:<fpage>16353</fpage>&#x2013;<lpage>67</lpage>. doi:<pub-id pub-id-type="doi">10.1109/ACCESS.2023.3244099</pub-id>.</mixed-citation></ref>
<ref id="ref-38"><label>[38]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Khashan</surname> <given-names>OA</given-names></string-name>, <string-name><surname>Khafajah</surname> <given-names>NM</given-names></string-name></person-group>. <article-title>Efficient hybrid centralized and blockchain-based authentication architecture for heterogeneous IoT systems</article-title>. <source>J King Saud Univ Comput Inf Sci</source>. <year>2023</year>;<volume>35</volume>(<issue>2</issue>):<fpage>726</fpage>&#x2013;<lpage>39</lpage>. doi:<pub-id pub-id-type="doi">10.1016/j.jksuci.2023.01.011</pub-id>.</mixed-citation></ref>
<ref id="ref-39"><label>[39]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Huangpeng</surname> <given-names>Q</given-names></string-name>, <string-name><surname>Yahya</surname> <given-names>RO</given-names></string-name></person-group>. <article-title>Distributed IoT services placement in fog environment using optimization-based evolutionary approaches</article-title>. <source>Expert Syst Appl</source>. <year>2024</year>;<volume>237</volume>(<issue>1</issue>):<fpage>121501</fpage>. doi:<pub-id pub-id-type="doi">10.1016/j.eswa.2023.121501</pub-id>.</mixed-citation></ref>
<ref id="ref-40"><label>[40]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Diwaker</surname> <given-names>C</given-names></string-name>, <string-name><surname>Sharma</surname> <given-names>A</given-names></string-name></person-group>. <article-title>ETOSP: energy-efficient task offloading strategy based on partial offloading in mobile edge computing framework for efficient resource management</article-title>. <source>J Auton Intell</source>. <year>2024</year>;<volume>7</volume>(<issue>3</issue>).</mixed-citation></ref>
<ref id="ref-41"><label>[41]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Lara-Ben&#x00ED;tez</surname> <given-names>P</given-names></string-name>, <string-name><surname>Carranza-Garc&#x00ED;a</surname> <given-names>M</given-names></string-name>, <string-name><surname>Riquelme</surname> <given-names>JC</given-names></string-name></person-group>. <article-title>An experimental review on deep learning architectures for time series forecasting</article-title>. <source>Int J Neural Syst</source>. <year>2021</year>;<volume>31</volume>(<issue>3</issue>):<fpage>2130001</fpage>. doi:<pub-id pub-id-type="doi">10.1142/S0129065721300011</pub-id>; <pub-id pub-id-type="pmid">33588711</pub-id></mixed-citation></ref>
<ref id="ref-42"><label>[42]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Liu</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Liu</surname> <given-names>A</given-names></string-name>, <string-name><surname>Xia</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Hu</surname> <given-names>B</given-names></string-name>, <string-name><surname>Liu</surname> <given-names>J</given-names></string-name>, <string-name><surname>Wu</surname> <given-names>Q</given-names></string-name>, <etal>et al</etal></person-group>. <article-title>A blockchain-based cross-domain authentication management system for IoT devices</article-title>. <source>IEEE Trans Netw Sci Eng</source>. <year>2023</year>;<volume>11</volume>(<issue>1</issue>):<fpage>115</fpage>&#x2013;<lpage>27</lpage>. doi:<pub-id pub-id-type="doi">10.1109/TNSE.2023.3292624</pub-id>.</mixed-citation></ref>
<ref id="ref-43"><label>[43]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Muazu</surname> <given-names>T</given-names></string-name>, <string-name><surname>Yingchi</surname> <given-names>M</given-names></string-name>, <string-name><surname>Muhammad</surname> <given-names>AU</given-names></string-name>, <string-name><surname>Ibrahim</surname> <given-names>M</given-names></string-name>, <string-name><surname>Samuel</surname> <given-names>O</given-names></string-name>, <string-name><surname>Tiwari</surname> <given-names>P</given-names></string-name></person-group>. <article-title>IoMT: a medical resource management system using edge-empowered blockchain federated learning</article-title>. <source>IEEE Trans Netw Serv Manag</source>. <year>2023</year>;<volume>21</volume>(<issue>1</issue>):<fpage>517</fpage>&#x2013;<lpage>34</lpage>. doi:<pub-id pub-id-type="doi">10.1109/TNSM.2023.3308331</pub-id>.</mixed-citation></ref>
<ref id="ref-44"><label>[44]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Syu</surname> <given-names>JH</given-names></string-name>, <string-name><surname>Lin</surname> <given-names>JCW</given-names></string-name>, <string-name><surname>Srivastava</surname> <given-names>G</given-names></string-name>, <string-name><surname>Yu</surname> <given-names>K</given-names></string-name></person-group>. <article-title>A comprehensive survey on artificial intelligence empowered edge computing on consumer electronics</article-title>. <source>IEEE Trans Consum Electron</source>. <year>2023</year>;<volume>69</volume>(<issue>4</issue>):<fpage>1023</fpage>&#x2013;<lpage>34</lpage>. doi:<pub-id pub-id-type="doi">10.1109/TCE.2023.3318150</pub-id>.</mixed-citation></ref>
<ref id="ref-45"><label>[45]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Nabi</surname> <given-names>ST</given-names></string-name>, <string-name><surname>Islam</surname> <given-names>MR</given-names></string-name>, <string-name><surname>Alam</surname> <given-names>MGR</given-names></string-name>, <string-name><surname>Hassan</surname> <given-names>MM</given-names></string-name>, <string-name><surname>AlQahtani</surname> <given-names>SA</given-names></string-name>, <string-name><surname>Aloi</surname> <given-names>G</given-names></string-name>, <etal>et al</etal></person-group>. <article-title>Deep learning-based fusion model for multivariate LTE traffic forecasting and optimized radio parameter estimation</article-title>. <source>IEEE Access</source>. <year>2023</year>;<volume>11</volume>(<issue>5</issue>):<fpage>14533</fpage>&#x2013;<lpage>49</lpage>. doi:<pub-id pub-id-type="doi">10.1109/ACCESS.2023.3242861</pub-id>.</mixed-citation></ref>
<ref id="ref-46"><label>[46]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Rajagukguk</surname> <given-names>RA</given-names></string-name>, <string-name><surname>Ramadhan</surname> <given-names>RAA</given-names></string-name>, <string-name><surname>Lee</surname> <given-names>HJ</given-names></string-name></person-group>. <article-title>A review on deep learning models for forecasting time series data of solar irradiance and photovoltaic power</article-title>. <source>Energies</source>. <year>2020</year>;<volume>13</volume>(<issue>24</issue>):<fpage>6623</fpage>. doi:<pub-id pub-id-type="doi">10.3390/en13246623</pub-id>.</mixed-citation></ref>
<ref id="ref-47"><label>[47]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Ali</surname> <given-names>NF</given-names></string-name>, <string-name><surname>Atef</surname> <given-names>M</given-names></string-name></person-group>. <article-title>An efficient hybrid LSTM-ANN joint classification-regression model for PPG-based blood pressure monitoring</article-title>. <source>Biomed Signal Process Control</source>. <year>2023</year>;<volume>84</volume>(<issue>2</issue>):<fpage>104782</fpage>. doi:<pub-id pub-id-type="doi">10.1016/j.bspc.2023.104782</pub-id>.</mixed-citation></ref>
</ref-list>
</back></article>






