{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,5]],"date-time":"2025-12-05T12:22:09Z","timestamp":1764937329235,"version":"3.41.0"},"reference-count":45,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2021,10,22]],"date-time":"2021-10-22T00:00:00Z","timestamp":1634860800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61902203"],"award-info":[{"award-number":["61902203"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Key Research and Development Plan - Major Scientific and Technological Innovation Projects of ShanDong Province","award":["2019JZZY020101"],"award-info":[{"award-number":["2019JZZY020101"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Internet Technol."],"published-print":{"date-parts":[[2022,5,31]]},"abstract":"<jats:p>Objective: Green computing meets the needs of a low-carbon society and it is an important aspect of promoting social sustainable development and technological progress. In the investigation, green computing for resource management and allocation issues is only discussed. Therefore, in the context of the 5G communication network, the investigation of the data classification and resource optimization of the Internet of Things are conducted. Method: The virtualization architecture of the heterogeneous wireless network resource based on 5G technology is designed. The related investigation is conducted based on 5G network and Internet of Things technology. Under the traditional method, the transfer learning is introduced to improve the AdaBoost (Adaptive Boosting) algorithm to classify the data. The investigated complete resource reuse method is used to optimize resources. A method that a sub-channel can be reused by a cellular link and any number of D2D links at the same time is proposed to conduct resource optimization investigation. Results: The investigation indicates that the classification accuracy of the algorithm is excellent for the data classification of the Internet of Things and has different advantages in various aspects compared with other algorithms. The designed algorithm can find a larger set of resource reuse and have a significant increase in spectrum utilization efficiency. Conclusion: The investigation can contribute to the boom in the Internet of Things in terms of data classification and resource optimization based on 5G.<\/jats:p>","DOI":"10.1145\/3434774","type":"journal-article","created":{"date-parts":[[2021,10,23]],"date-time":"2021-10-23T03:14:43Z","timestamp":1634958883000},"page":"1-16","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Transfer Learning-powered Resource Optimization for Green Computing in 5G-Aided Industrial Internet of Things"],"prefix":"10.1145","volume":"22","author":[{"given":"Zhihan","family":"Lv","sequence":"first","affiliation":[{"name":"School of Data Science and Software Engineering, Qingdao University, Qingdao, China and Artificial Intelligence Department, Institute of Computer Science, Warsaw University of Technology, Warsaw, Poland"}]},{"given":"Ranran","family":"Lou","sequence":"additional","affiliation":[{"name":"School of Data Science and Software Engineering, Qingdao University, Qingdao, China"}]},{"given":"Amit","family":"Kumar Singh","sequence":"additional","affiliation":[{"name":"Department of Computer Science &amp; Engineering, National Institute of Technology Patna, (An Institute under MHRD, Govt. of India), India"}]},{"given":"Qingjun","family":"Wang","sequence":"additional","affiliation":[{"name":"Shenyang Aerospace University, Shenyang, China and Nanjing University of Aeronautics and Astronautics, Nanjing, China"}]}],"member":"320","published-online":{"date-parts":[[2021,10,22]]},"reference":[{"key":"e_1_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2019.2894304"},{"key":"e_1_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2529723"},{"key":"e_1_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2683200"},{"key":"e_1_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2578298"},{"key":"e_1_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2638449"},{"key":"e_1_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2017.28"},{"key":"e_1_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2019.2905611"},{"key":"e_1_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2017.2751045"},{"key":"e_1_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.1109\/MVT.2019.2904185"},{"key":"e_1_3_1_11_2","volume-title":"IEEE Access","author":"Akpakwu G.","year":"2017","unstructured":"G. Akpakwu, B. Silva, G. P. Hancke, and A. M. Abu-Mahfouz. 2017. A survey on 5G networks for the Internet of Things: Communication technologies and challenges. IEEE Access 6 (2017), 3619--3647."},{"key":"e_1_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.1109\/mwc.2017.1600421"},{"key":"e_1_3_1_13_2","first-page":"6900","volume-title":"IEEE Access","volume":"6","author":"Yu W.","year":"2017","unstructured":"W. Yu, F. Liang, X. He, W. G. Hatcher, C. Lu, J. Lin, and X. Yang. 2017. A survey on the edge computing for the Internet of Things. IEEE Access 6 (2017), 6900\u20136919."},{"key":"e_1_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.1007\/s13042-018-00916-z"},{"key":"e_1_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.1109\/JETCAS.2018.2836319"},{"key":"e_1_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2911978"},{"key":"e_1_3_1_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2847731"},{"key":"e_1_3_1_18_2","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1700625"},{"key":"e_1_3_1_19_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2888543"},{"key":"e_1_3_1_20_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2830651"},{"key":"e_1_3_1_21_2","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1700714"},{"key":"e_1_3_1_22_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2884485"},{"key":"e_1_3_1_23_2","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1600374CM"},{"key":"e_1_3_1_24_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2720855"},{"key":"e_1_3_1_25_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2773600"},{"key":"e_1_3_1_26_2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2739340"},{"key":"e_1_3_1_27_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2874531"},{"key":"e_1_3_1_28_2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2902574"},{"key":"e_1_3_1_29_2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2858142"},{"key":"e_1_3_1_30_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2017.2718189"},{"key":"e_1_3_1_31_2","doi-asserted-by":"publisher","DOI":"10.1109\/TPEL.2017.2652318"},{"key":"e_1_3_1_32_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2947359"},{"key":"e_1_3_1_33_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2806420"},{"key":"e_1_3_1_34_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2954588"},{"key":"e_1_3_1_35_2","volume-title":"IEEE Transactions on Industrial Informatics","author":"Casolla G.","year":"2019","unstructured":"G. Casolla, S. Cuomo, V. S. di Cola, and F. Piccialli. 2019. Exploring unsupervised learning techniques for the Internet of Things. IEEE Transactions on Industrial Informatics 16, 4 (2019), 2621--2628."},{"key":"e_1_3_1_36_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2942719"},{"key":"e_1_3_1_37_2","first-page":"1","article-title":"A machine learning approach for IoT cultural data","author":"Piccialli F.","year":"2019","unstructured":"F. Piccialli, S. Cuomo, V. S. di Cola, and G. Casolla. 2019. A machine learning approach for IoT cultural data. Journal of Ambient Intelligence and Humanized Computing (2019), 1\u201312.","journal-title":"Journal of Ambient Intelligence and Humanized Computing"},{"key":"e_1_3_1_38_2","volume-title":"IEEE Transactions on Industrial Informatics","author":"Lv Z.","year":"2019","unstructured":"Z. Lv, X. Li, H. Lv, and W. Xiu. 2019. BIM big data storage in WebVRGIS. IEEE Transactions on Industrial Informatics 16, 4 (2019), 2566--2573."},{"key":"e_1_3_1_39_2","doi-asserted-by":"publisher","DOI":"10.1038\/s41928-019-0355-6"},{"key":"e_1_3_1_40_2","volume-title":"IEEE Intelligent Systems","author":"Piccialli F.","year":"2019","unstructured":"F. Piccialli, G. Casolla, S. Cuomo, F. Giampaolo, and V. S. di Cola. 2019. Decision making in IoT environment through unsupervised learning. IEEE Intelligent Systems 35, 1 (2019), 27--35."},{"key":"e_1_3_1_41_2","volume-title":"IEEE Transactions on Industrial Informatics","author":"Lv Z.","year":"2019","unstructured":"Z. Lv, W. Kong, X. Zhang, D. Jiang, H. Lv, and X. Lu. 2019. Intelligent security planning for regional distributed energy internet. IEEE Transactions on Industrial Informatics 16, 5 (2019), 3540--3547."},{"key":"e_1_3_1_42_2","doi-asserted-by":"crossref","DOI":"10.1007\/s00521-019-04693-w","article-title":"LMM: Latency-aware micro-service mashup in mobile edge computing environment","author":"Zhou A.","year":"2020","unstructured":"A. Zhou, S. Wang, S. Wan, and L. Qi. 2020. LMM: Latency-aware micro-service mashup in mobile edge computing environment. Neural Computing and Applications 32, 19 (2020), 15411--15425.","journal-title":"Neural Computing and Applications"},{"key":"e_1_3_1_43_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2019.10.012"},{"key":"e_1_3_1_44_2","volume-title":"IEEE Transactions on Industrial Informatics","author":"Lv Z.","year":"2019","unstructured":"Z. Lv, B. Hu, and H. Lv. 2019. Infrastructure monitoring and operation for smart cities based on IoT system. IEEE Transactions on Industrial Informatics 16, 3 (2019), 1957--1962."},{"key":"e_1_3_1_45_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2020.2976573"},{"key":"e_1_3_1_46_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2019.2899936"}],"container-title":["ACM Transactions on Internet Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3434774","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3434774","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:47:07Z","timestamp":1750193227000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3434774"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,22]]},"references-count":45,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2022,5,31]]}},"alternative-id":["10.1145\/3434774"],"URL":"https:\/\/doi.org\/10.1145\/3434774","relation":{},"ISSN":["1533-5399","1557-6051"],"issn-type":[{"type":"print","value":"1533-5399"},{"type":"electronic","value":"1557-6051"}],"subject":[],"published":{"date-parts":[[2021,10,22]]},"assertion":[{"value":"2020-05-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-11-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-10-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}