With the arrival of the 4G and 5G,the telecommunications networks have experienced a large expansion of these networks.That enabled the integration of many services and adequate flow,thus enabling the operators to res...With the arrival of the 4G and 5G,the telecommunications networks have experienced a large expansion of these networks.That enabled the integration of many services and adequate flow,thus enabling the operators to respond to the growing demand of users.This rapid evolution has given the operators to adapt,their methods to the new technologies that increase.This complexity becomes more important,when these networks include several technologies to access different from the heterogeneous network like in the 4G network.The dimensional new challenges tell the application and the considerable increase in demand for services and the compatibility with existing networks,the management of mobility intercellular of users and it offers a better quality of services.Thus,the proposed solution to meet these new requirements is the sizing of the EPC(Evolved Packet Core)core network to support the 5G access network.For the case of Orange Guinea,this involves setting up an architecture for interconnecting the core networks of Sonfonia and Camayenne.The objectives of our work are of two orders:(1)to propose these solutions and recommendations for the heart network EPC sizing and the deployment to be adopted;(2)supply and architectural interconnection in the heart network EPC and an existing heart network.In our work,the model of traffic in communication that we use to calculate the traffic generated with each technology has link in the network of the heart.展开更多
In the era of the digital economy,the informatization degree of various industries is getting deeper and deeper,and network information security has also come into people’s eyes.Colleges and universities are in the p...In the era of the digital economy,the informatization degree of various industries is getting deeper and deeper,and network information security has also come into people’s eyes.Colleges and universities are in the position of training applied talents,because of the needs of teaching and education,as well as the requirements of teaching reform,the information construction of colleges and universities has been gradually improved,but the problem of network information security is also worth causing people to ponder.The low security of the network environment will cause college network information security leaks,and even hackers will attack the official website of the university and leak the personal information of teachers and students.To solve such problems,this paper studies the protection of college network information security against the background of the digital economy era.This paper first analyzes the significance of network information security protection,then points out the current and moral problems,and finally puts forward specific countermeasures,hoping to create a safe learning environment for teachers and students for reference.展开更多
With the rapid development of the Internet,the network ideology of colleges and universities is facing severe challenges.This paper deeply analyzes the root of the risk of network ideology and makes a specific investi...With the rapid development of the Internet,the network ideology of colleges and universities is facing severe challenges.This paper deeply analyzes the root of the risk of network ideology and makes a specific investigation of the status quo of network public opinion in colleges and universities.On this basis,the study explores and puts forward a series of targeted risk prevention and resolution strategies,aiming at providing a systematic solution for the network ideology security of colleges and universities.In this paper,with the combination of theory and practice as the path,we verify the effectiveness and applicability of the proposed strategy through the analysis of the implementation effect of the strategy.This study also provides theoretical support and practical guidance for the prevention and control of ideological risks and public opinion guidance in universities under the network environment,which has important practical significance.With the continuous progress of network technology,the threats to the network ideology of colleges and universities are increasing.For example,the spread of false information has become a serious problem affecting the security of college network ideology.展开更多
A quantum BP neural networks model with learning algorithm is proposed. First, based on the universality of single qubit rotation gate and two-qubit controlled-NOT gate, a quantum neuron model is constructed, which is...A quantum BP neural networks model with learning algorithm is proposed. First, based on the universality of single qubit rotation gate and two-qubit controlled-NOT gate, a quantum neuron model is constructed, which is composed of input, phase rotation, aggregation, reversal rotation and output. In this model, the input is described by qubits, and the output is given by the probability of the state in which (1) is observed. The phase rotation and the reversal rotation are performed by the universal quantum gates. Secondly, the quantum BP neural networks model is constructed, in which the output layer and the hide layer are quantum neurons. With the application of the gradient descent algorithm, a learning algorithm of the model is proposed, and the continuity of the model is proved. It is shown that this model and algorithm are superior to the conventional BP networks in three aspects: convergence speed, convergence rate and robustness, by two application examples of pattern recognition and function approximation.展开更多
After years’ verification in theory and trial test,the 3G UMTS network has been widely deployed in many countries around the world.This article focuses on the typical problems met during the optimization engineering ...After years’ verification in theory and trial test,the 3G UMTS network has been widely deployed in many countries around the world.This article focuses on the typical problems met during the optimization engineering project, and gives the solution usually used with theoretical analysis at the same time.展开更多
The geometric characteristics of fractures within a rock mass can be inferred by the data sampling from boreholes or exposed surfaces.Recently,the universal elliptical disc(UED)model was developed to represent natural...The geometric characteristics of fractures within a rock mass can be inferred by the data sampling from boreholes or exposed surfaces.Recently,the universal elliptical disc(UED)model was developed to represent natural fractures,where the fracture is assumed to be an elliptical disc and the fracture orientation,rotation angle,length of the long axis and ratio of short-long axis lengths are considered as variables.This paper aims to estimate the fracture size-and azimuth-related parameters in the UED model based on the trace information from sampling windows.The stereological relationship between the trace length,size-and azimuth-related parameters of the UED model was established,and the formulae of the mean value and standard deviation of trace length were proposed.The proposed formulae were validated via the Monte Carlo simulations with less than 5%of error rate between the calculated and true values.With respect to the estimation of the size-and azimuth-related parameters using the trace length,an optimization method was developed based on the pre-assumed size and azimuth distribution forms.A hypothetical case study was designed to illustrate and verify the parameter estimation method,where three combinations of the sampling windows were used to estimate the parameters,and the results showed that the estimated values could agree well with the true values.Furthermore,a hypothetical three-dimensional(3D)elliptical fracture network was constructed,and the circular disc,non-UED and UED models were used to represent it.The simulated trace information from different models was compared,and the results clearly illustrated the superiority of the proposed UED model over the existing circular disc and non-UED models。展开更多
Heterogeneous networks combine different access technologies. An important problem in such networks is the selection of the most suitable radio access network. To perform this task efficiently, a lot of information is...Heterogeneous networks combine different access technologies. An important problem in such networks is the selection of the most suitable radio access network. To perform this task efficiently, a lot of information is required, such as signal strength, QoS, monetary cost, battery consumption, and user preferences. These are well known issues and a considerable effort has been made to tackle them using a number of solutions. These efforts improve the performance of vertical handover but also add considerable complexity. In this paper, we introduce an enhanced algorithm for radio access network selection, which is simple, flexible and applicable to future mobile systems. Its main characteristics are the distribution of the radio access selection process among the mobile terminal and the core network, the evaluation of mobile terminal connections separately and the primary role of user preferences in the final decision. The performance of the algorithm is evaluated through simulation results, which show that the algorithm provides a high rate of user satisfaction. It decreases the messages required for the vertical handovers in the whole network and it alleviates the core network from the processing of unnecessary requests.展开更多
The continuously growing of cellular networks complexity, which followed the introduction of UMTS technology, has reduced the usefulness of traditional design tools, making them quite unworthy. The purpose of this pap...The continuously growing of cellular networks complexity, which followed the introduction of UMTS technology, has reduced the usefulness of traditional design tools, making them quite unworthy. The purpose of this paper is to illustrate a design tool for UMTS optimized net planning based on genetic algorithms. In particular, some utilities for 3G net designers, useful to respect important aspects (such as the environmental one) of the cellular network, are shown.展开更多
Handover in Digital Video Broadcasting for Handhelds(DVB-H) aims to provide continuous mobile broadcasting services when a user is traveling through cell boundaries.A good handover control can improve the power effici...Handover in Digital Video Broadcasting for Handhelds(DVB-H) aims to provide continuous mobile broadcasting services when a user is traveling through cell boundaries.A good handover control can improve the power efficiency and gain much better reception quality.This letter provides a novel approach for DVB-H handover based on DVB-H/Universal Mobile Telecommunications System(UMTS) hybrid network,which moves the main handover function from the terminals to the networks,so that it reduces the operation complexity of the terminals and increases the power saving.When the terminal can not receive the DVB-H signal in the transmission shadow areas or because of some other reasons,the UMTS networks may offer the same service to users to make the service continuous.As the UMTS networks have the topology of the DVB-H networks,by communicating with the terminals,the UMTS networks can help the terminals to predict the handover,and avoid unnecessary handover.展开更多
Universal service obligation of network industries, such as telecommunication, electric power, post, railway, and aviation, has greatly hampered the progress of their marketization reform. Establishing universal servi...Universal service obligation of network industries, such as telecommunication, electric power, post, railway, and aviation, has greatly hampered the progress of their marketization reform. Establishing universal service fund could be an efficient solution. This paper provides a method to calculate the charging rate, imposing and allowancing range of universal service fund for network industries, it also proves the feasibility of accomplishing universal service through universal service fund in network industries.展开更多
Recently,deep learning has achieved remarkable results in fields that require human cognitive ability,learning ability,and reasoning ability.Activation functions are very important because they provide the ability of ...Recently,deep learning has achieved remarkable results in fields that require human cognitive ability,learning ability,and reasoning ability.Activation functions are very important because they provide the ability of artificial neural networks to learn complex patterns through nonlinearity.Various activation functions are being studied to solve problems such as vanishing gradients and dying nodes that may occur in the deep learning process.However,it takes a lot of time and effort for researchers to use the existing activation function in their research.Therefore,in this paper,we propose a universal activation function(UA)so that researchers can easily create and apply various activation functions and improve the performance of neural networks.UA can generate new types of activation functions as well as functions like traditional activation functions by properly adjusting three hyperparameters.The famous Convolutional Neural Network(CNN)and benchmark datasetwere used to evaluate the experimental performance of the UA proposed in this study.We compared the performance of the artificial neural network to which the traditional activation function is applied and the artificial neural network to which theUA is applied.In addition,we evaluated the performance of the new activation function generated by adjusting the hyperparameters of theUA.The experimental performance evaluation results showed that the classification performance of CNNs improved by up to 5%through the UA,although most of them showed similar performance to the traditional activation function.展开更多
文摘With the arrival of the 4G and 5G,the telecommunications networks have experienced a large expansion of these networks.That enabled the integration of many services and adequate flow,thus enabling the operators to respond to the growing demand of users.This rapid evolution has given the operators to adapt,their methods to the new technologies that increase.This complexity becomes more important,when these networks include several technologies to access different from the heterogeneous network like in the 4G network.The dimensional new challenges tell the application and the considerable increase in demand for services and the compatibility with existing networks,the management of mobility intercellular of users and it offers a better quality of services.Thus,the proposed solution to meet these new requirements is the sizing of the EPC(Evolved Packet Core)core network to support the 5G access network.For the case of Orange Guinea,this involves setting up an architecture for interconnecting the core networks of Sonfonia and Camayenne.The objectives of our work are of two orders:(1)to propose these solutions and recommendations for the heart network EPC sizing and the deployment to be adopted;(2)supply and architectural interconnection in the heart network EPC and an existing heart network.In our work,the model of traffic in communication that we use to calculate the traffic generated with each technology has link in the network of the heart.
文摘In the era of the digital economy,the informatization degree of various industries is getting deeper and deeper,and network information security has also come into people’s eyes.Colleges and universities are in the position of training applied talents,because of the needs of teaching and education,as well as the requirements of teaching reform,the information construction of colleges and universities has been gradually improved,but the problem of network information security is also worth causing people to ponder.The low security of the network environment will cause college network information security leaks,and even hackers will attack the official website of the university and leak the personal information of teachers and students.To solve such problems,this paper studies the protection of college network information security against the background of the digital economy era.This paper first analyzes the significance of network information security protection,then points out the current and moral problems,and finally puts forward specific countermeasures,hoping to create a safe learning environment for teachers and students for reference.
文摘With the rapid development of the Internet,the network ideology of colleges and universities is facing severe challenges.This paper deeply analyzes the root of the risk of network ideology and makes a specific investigation of the status quo of network public opinion in colleges and universities.On this basis,the study explores and puts forward a series of targeted risk prevention and resolution strategies,aiming at providing a systematic solution for the network ideology security of colleges and universities.In this paper,with the combination of theory and practice as the path,we verify the effectiveness and applicability of the proposed strategy through the analysis of the implementation effect of the strategy.This study also provides theoretical support and practical guidance for the prevention and control of ideological risks and public opinion guidance in universities under the network environment,which has important practical significance.With the continuous progress of network technology,the threats to the network ideology of colleges and universities are increasing.For example,the spread of false information has become a serious problem affecting the security of college network ideology.
基金the National Natural Science Foundation of China (50138010)
文摘A quantum BP neural networks model with learning algorithm is proposed. First, based on the universality of single qubit rotation gate and two-qubit controlled-NOT gate, a quantum neuron model is constructed, which is composed of input, phase rotation, aggregation, reversal rotation and output. In this model, the input is described by qubits, and the output is given by the probability of the state in which (1) is observed. The phase rotation and the reversal rotation are performed by the universal quantum gates. Secondly, the quantum BP neural networks model is constructed, in which the output layer and the hide layer are quantum neurons. With the application of the gradient descent algorithm, a learning algorithm of the model is proposed, and the continuity of the model is proved. It is shown that this model and algorithm are superior to the conventional BP networks in three aspects: convergence speed, convergence rate and robustness, by two application examples of pattern recognition and function approximation.
文摘After years’ verification in theory and trial test,the 3G UMTS network has been widely deployed in many countries around the world.This article focuses on the typical problems met during the optimization engineering project, and gives the solution usually used with theoretical analysis at the same time.
基金funded by National Natural Science Foundation of China(Grant No.41972264)Zhejiang Provincial Natural Science Foundation of China(Grant No.LR22E080002)the Observation and Research Station of Geohazards in Zhejiang,Ministry of Natural Resources,China(Grant No.ZJDZGCZ-2021).
文摘The geometric characteristics of fractures within a rock mass can be inferred by the data sampling from boreholes or exposed surfaces.Recently,the universal elliptical disc(UED)model was developed to represent natural fractures,where the fracture is assumed to be an elliptical disc and the fracture orientation,rotation angle,length of the long axis and ratio of short-long axis lengths are considered as variables.This paper aims to estimate the fracture size-and azimuth-related parameters in the UED model based on the trace information from sampling windows.The stereological relationship between the trace length,size-and azimuth-related parameters of the UED model was established,and the formulae of the mean value and standard deviation of trace length were proposed.The proposed formulae were validated via the Monte Carlo simulations with less than 5%of error rate between the calculated and true values.With respect to the estimation of the size-and azimuth-related parameters using the trace length,an optimization method was developed based on the pre-assumed size and azimuth distribution forms.A hypothetical case study was designed to illustrate and verify the parameter estimation method,where three combinations of the sampling windows were used to estimate the parameters,and the results showed that the estimated values could agree well with the true values.Furthermore,a hypothetical three-dimensional(3D)elliptical fracture network was constructed,and the circular disc,non-UED and UED models were used to represent it.The simulated trace information from different models was compared,and the results clearly illustrated the superiority of the proposed UED model over the existing circular disc and non-UED models。
文摘Heterogeneous networks combine different access technologies. An important problem in such networks is the selection of the most suitable radio access network. To perform this task efficiently, a lot of information is required, such as signal strength, QoS, monetary cost, battery consumption, and user preferences. These are well known issues and a considerable effort has been made to tackle them using a number of solutions. These efforts improve the performance of vertical handover but also add considerable complexity. In this paper, we introduce an enhanced algorithm for radio access network selection, which is simple, flexible and applicable to future mobile systems. Its main characteristics are the distribution of the radio access selection process among the mobile terminal and the core network, the evaluation of mobile terminal connections separately and the primary role of user preferences in the final decision. The performance of the algorithm is evaluated through simulation results, which show that the algorithm provides a high rate of user satisfaction. It decreases the messages required for the vertical handovers in the whole network and it alleviates the core network from the processing of unnecessary requests.
文摘The continuously growing of cellular networks complexity, which followed the introduction of UMTS technology, has reduced the usefulness of traditional design tools, making them quite unworthy. The purpose of this paper is to illustrate a design tool for UMTS optimized net planning based on genetic algorithms. In particular, some utilities for 3G net designers, useful to respect important aspects (such as the environmental one) of the cellular network, are shown.
基金the National Science Fund for Distinguished Young Scholars (No.60525110)the National 973 Program (No.2007CB307100, No.2007CB307103)+1 种基金the Program for New Century Excellent Talents in University (No. NCET-04-0111)the Development Fund Project for Electronic and Information Industry (Mobile Service and Application System Based on 3G)
文摘Handover in Digital Video Broadcasting for Handhelds(DVB-H) aims to provide continuous mobile broadcasting services when a user is traveling through cell boundaries.A good handover control can improve the power efficiency and gain much better reception quality.This letter provides a novel approach for DVB-H handover based on DVB-H/Universal Mobile Telecommunications System(UMTS) hybrid network,which moves the main handover function from the terminals to the networks,so that it reduces the operation complexity of the terminals and increases the power saving.When the terminal can not receive the DVB-H signal in the transmission shadow areas or because of some other reasons,the UMTS networks may offer the same service to users to make the service continuous.As the UMTS networks have the topology of the DVB-H networks,by communicating with the terminals,the UMTS networks can help the terminals to predict the handover,and avoid unnecessary handover.
文摘Universal service obligation of network industries, such as telecommunication, electric power, post, railway, and aviation, has greatly hampered the progress of their marketization reform. Establishing universal service fund could be an efficient solution. This paper provides a method to calculate the charging rate, imposing and allowancing range of universal service fund for network industries, it also proves the feasibility of accomplishing universal service through universal service fund in network industries.
基金This work was supported by the National Research Foundation of Korea(NRF)grant funded by the Korea government(MSIT)(No.2022R1F1A1062953).
文摘Recently,deep learning has achieved remarkable results in fields that require human cognitive ability,learning ability,and reasoning ability.Activation functions are very important because they provide the ability of artificial neural networks to learn complex patterns through nonlinearity.Various activation functions are being studied to solve problems such as vanishing gradients and dying nodes that may occur in the deep learning process.However,it takes a lot of time and effort for researchers to use the existing activation function in their research.Therefore,in this paper,we propose a universal activation function(UA)so that researchers can easily create and apply various activation functions and improve the performance of neural networks.UA can generate new types of activation functions as well as functions like traditional activation functions by properly adjusting three hyperparameters.The famous Convolutional Neural Network(CNN)and benchmark datasetwere used to evaluate the experimental performance of the UA proposed in this study.We compared the performance of the artificial neural network to which the traditional activation function is applied and the artificial neural network to which theUA is applied.In addition,we evaluated the performance of the new activation function generated by adjusting the hyperparameters of theUA.The experimental performance evaluation results showed that the classification performance of CNNs improved by up to 5%through the UA,although most of them showed similar performance to the traditional activation function.