{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T16:24:23Z","timestamp":1774023863053,"version":"3.50.1"},"reference-count":28,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,12,4]],"date-time":"2022-12-04T00:00:00Z","timestamp":1670112000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,12,4]],"date-time":"2022-12-04T00:00:00Z","timestamp":1670112000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,12,4]]},"DOI":"10.1109\/gcwkshps56602.2022.10008702","type":"proceedings-article","created":{"date-parts":[[2023,1,12]],"date-time":"2023-01-12T21:38:14Z","timestamp":1673559494000},"page":"461-466","source":"Crossref","is-referenced-by-count":15,"title":["Deep-Learning Based Proactive Handover for 5G\/6G Mobile Networks using Wireless Information"],"prefix":"10.1109","author":[{"given":"Satya Kumar","family":"Vankayala","sequence":"first","affiliation":[{"name":"Samsung R &#x0026; D Institute,Networks S\/W R &#x0026; D Group,Bengaluru,India"}]},{"given":"Sai Krishna Santosh","family":"Gollapudi","sequence":"additional","affiliation":[{"name":"Samsung R &#x0026; D Institute,Networks S\/W R &#x0026; D Group,Bengaluru,India"}]},{"given":"Sukhdeep","family":"Singh","sequence":"additional","affiliation":[{"name":"Samsung R &#x0026; D Institute,Networks S\/W R &#x0026; D Group,Bengaluru,India"}]},{"given":"Bharat","family":"Jain","sequence":"additional","affiliation":[{"name":"Samsung R &#x0026; D Institute,Networks S\/W R &#x0026; D Group,Bengaluru,India"}]},{"given":"Seungil","family":"Yoon","sequence":"additional","affiliation":[{"name":"Samsung Electronics,Networks S\/W R &#x0026; D Group,Suwon,South Korea"}]},{"given":"Ali Kashif","family":"Bashir","sequence":"additional","affiliation":[{"name":"Manchester Metropolitan University,Manchester,UK"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2021.3061701"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2013.2260813"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MVT.2021.3136506"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2020.3003670"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2021.3104219"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2022.3170420"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/OJCOMS.2022.3162591"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2021.3049262"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2921522"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2022.3183632"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2017.2720338"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2017.2720482"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOMW.2016.7848840"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOMW.2016.7848840"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/MedHocNet.2016.7528494"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2019.2952602"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/JCN.2020.000012"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-020-03387-8"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2020.3003670"},{"key":"ref20","doi-asserted-by":"crossref","DOI":"10.1109\/ICCV.2015.123","article-title":"Delving deep into rectifiers: Surpassing human-level performance on imagenet classification","author":"He","year":"2015"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2020.3027027"},{"key":"ref22","article-title":"Intelligent blockage prediction and proactive handover for seamless connectivity in vision-aided 5g\/6g udns","author":"Al-Quraan","year":"2022"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1600655"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/JETCAS.2020.2991024"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/WPMC52694.2021.9700474"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2022.3168076"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2022.3168076"},{"key":"ref28","article-title":"Swish: a self-gated activation function","author":"Ramachandran","year":"2017"}],"event":{"name":"2022 IEEE Globecom Workshops (GC Wkshps)","location":"Rio de Janeiro, Brazil","start":{"date-parts":[[2022,12,4]]},"end":{"date-parts":[[2022,12,8]]}},"container-title":["2022 IEEE Globecom Workshops (GC Wkshps)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10008390\/10008474\/10008702.pdf?arnumber=10008702","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,9]],"date-time":"2024-02-09T06:32:21Z","timestamp":1707460341000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10008702\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,4]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/gcwkshps56602.2022.10008702","relation":{},"subject":[],"published":{"date-parts":[[2022,12,4]]}}}