{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T13:44:47Z","timestamp":1774359887255,"version":"3.50.1"},"reference-count":55,"publisher":"Wiley","license":[{"start":{"date-parts":[[2021,7,31]],"date-time":"2021-07-31T00:00:00Z","timestamp":1627689600000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"King Faisal University","award":["216016"],"award-info":[{"award-number":["216016"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Mobile Information Systems"],"published-print":{"date-parts":[[2021,7,31]]},"abstract":"<jats:p>The evolution of cellular technology development has led to explosive growth in cellular network traffic. Accurate time-series models to predict cellular mobile traffic have become very important for increasing the quality of service (QoS) with a network. The modelling and forecasting of cellular network loading play an important role in achieving the greatest favourable resource allocation by convenient bandwidth provisioning and simultaneously preserve the highest network utilization. The novelty of the proposed research is to develop a model that can help intelligently predict load traffic in a cellular network. In this paper, a model that combines single-exponential smoothing with long short-term memory (SES-LSTM) is proposed to predict cellular traffic. A min-max normalization model was used to scale the network loading. The single-exponential smoothing method was applied to adjust the volumes of network traffic, due to network traffic being very complex and having different forms. The output from a single-exponential model was processed by using an LSTM model to predict the network load. The intelligent system was evaluated by using real cellular network traffic that had been collected in a kaggle dataset. The results of the experiment revealed that the proposed method had superior accuracy, achieving R-square metric values of 88.21%, 92.20%, and 89.81% for three one-month time intervals, respectively. It was observed that the prediction values were very close to the observations. A comparison of the prediction results between the existing LSTM model and our proposed system is presented. The proposed system achieved superior performance for predicting cellular network traffic.<\/jats:p>","DOI":"10.1155\/2021\/6050627","type":"journal-article","created":{"date-parts":[[2021,8,2]],"date-time":"2021-08-02T19:05:33Z","timestamp":1627931133000},"page":"1-15","source":"Crossref","is-referenced-by-count":20,"title":["Cellular Traffic Prediction Based on an Intelligent Model"],"prefix":"10.1155","volume":"2021","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3723-4532","authenticated-orcid":true,"given":"Fawaz Waselallah","family":"Alsaade","sequence":"first","affiliation":[{"name":"College of Computer Science and Information Technology, King Faisal University, P.O. Box 400, Al-Hofuf, Al-Ahsa, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3519-1121","authenticated-orcid":true,"given":"Mosleh","family":"Hmoud Al-Adhaileh","sequence":"additional","affiliation":[{"name":"Deanship of E-learning and Distance Education King Faisal University Saudi Arabia, P.O. Box 400, Al-Hofuf, Al-Ahsa, Saudi Arabia"}]}],"member":"311","reference":[{"key":"1","volume-title":"Ericsson Mobility Report","author":"Ericsson","year":"2018"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/ICRCICN.2016.7813658"},{"key":"3","article-title":"5G. white paper","volume-title":"White Paper","author":"NGMN","year":"2015"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/6740585"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-005-4827-9"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.3141\/1836-18"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/mci.2009.932254"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/infocom.2017.8057090"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/lcomm.2018.2841832"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1093\/ietcom\/e88-b.10.3992"},{"key":"11","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1007\/0-387-34167-6_5","article-title":"Traffic modeling and prediction using ARIMA\/GARCH model","volume-title":"Modeling and Simulation Tools for Emerging Telecommunication Networks","author":"B. Zhou","year":"2006"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/mwc.2017.1600304wc"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2019.2904897"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/pimrc.2017.8292737"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2018.2832071"},{"key":"16","doi-asserted-by":"crossref","DOI":"10.1002\/9781119331797","volume-title":"Fundamentals of Network Planning and Optimisation 2G\/3G\/4G: Evolution to 5G","author":"A. R. Mishra","year":"2018","edition":"2nd"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/isdea.2010.335"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/SOFTCOM.2007.4446113"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-019-00556-w"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/lwc.2018.2795605"},{"key":"21","volume-title":"Machine Learning for Sequential Data: A Review","author":"T. G. Dietterich","year":"2002"},{"issue":"1","key":"22","first-page":"48","article-title":"ARIMA and regression in analytical review: an empirical test","volume":"53","author":"R. W. Kinney","year":"1978","journal-title":"The Accounting Review"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1988.10478694"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2005.12.126"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1162\/089976600300015565"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2007.10.005"},{"key":"27","doi-asserted-by":"crossref","DOI":"10.1002\/047084535X","volume-title":"Recurrent Neural Networks for Prediction: Learning Algorithms, Architectures and Stability","author":"D. P. Mandic","year":"2001"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1109\/tnnls.2016.2582924"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-004-0404-5"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2014.10.022"},{"key":"31","doi-asserted-by":"crossref","first-page":"49359","DOI":"10.18632\/oncotarget.17210","article-title":"Prediction of the aquatic toxicity of aromatic compounds to tetrahymena pyriformis through support vector regression","volume":"8","author":"S. Qiang","year":"2017","journal-title":"Oncotarget"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpowsour.2018.08.073"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1109\/tie.2017.2782224"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1016\/j.compchemeng.2017.11.020"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.1021\/acs.iecr.8b02539"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2011.07.100"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2017.12.004"},{"key":"38","doi-asserted-by":"publisher","DOI":"10.1016\/j.still.2017.04.009"},{"key":"39","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1016\/j.jfoodeng.2015.03.035","article-title":"A method to construct fruit maturity color scales based on support vector machines for regression: application to olives and grape seeds","volume":"162","author":"A. Felipe","year":"2015","journal-title":"Journal of Food Engineering"},{"key":"40","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-019-00556-w"},{"key":"41","doi-asserted-by":"publisher","DOI":"10.5121\/ijmnct.2013.3603"},{"key":"42","doi-asserted-by":"publisher","DOI":"10.1109\/vtcfall.2018.8690851"},{"key":"43","doi-asserted-by":"publisher","DOI":"10.1109\/pimrc.2018.8581000"},{"key":"44","doi-asserted-by":"publisher","DOI":"10.1109\/mnet.2018.1800127"},{"key":"45","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2017.7925498"},{"key":"46","doi-asserted-by":"publisher","DOI":"10.1109\/pimrc.2017.8292737"},{"key":"47","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-10997-4_14"},{"key":"48","doi-asserted-by":"publisher","DOI":"10.1145\/3209582.3209606"},{"key":"49","doi-asserted-by":"publisher","DOI":"10.1109\/infocom.2017.8057090"},{"key":"50","doi-asserted-by":"publisher","DOI":"10.1109\/lcomm.2018.2841832"},{"key":"51","doi-asserted-by":"publisher","DOI":"10.1109\/lwc.2018.2795605"},{"key":"52","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2018.2832071"},{"key":"53","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2017.2694140"},{"key":"54","doi-asserted-by":"publisher","DOI":"10.32604\/csse.2021.014992"},{"key":"55","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/5579851"}],"container-title":["Mobile Information Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/misy\/2021\/6050627.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/misy\/2021\/6050627.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/misy\/2021\/6050627.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,8,2]],"date-time":"2021-08-02T19:05:47Z","timestamp":1627931147000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/misy\/2021\/6050627\/"}},"subtitle":[],"editor":[{"given":"omar","family":"cheikhrouhou","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2021,7,31]]},"references-count":55,"alternative-id":["6050627","6050627"],"URL":"https:\/\/doi.org\/10.1155\/2021\/6050627","relation":{},"ISSN":["1875-905X","1574-017X"],"issn-type":[{"value":"1875-905X","type":"electronic"},{"value":"1574-017X","type":"print"}],"subject":[],"published":{"date-parts":[[2021,7,31]]}}}