The race to develop the next generation of wireless networks,known as Sixth Generation(6G)wireless,which will be operational in 2030,has already begun.To realize its full potential over the next decade,6G will undoubt...The race to develop the next generation of wireless networks,known as Sixth Generation(6G)wireless,which will be operational in 2030,has already begun.To realize its full potential over the next decade,6G will undoubtedly necessitate additional improvements that integrate existing solutions with cutting-edge ones.However,the studies about 6G are mainly limited and scattered,whereas no bibliometric study covers the 6G field.Thus,this study aims to review,examine,and summarize existing studies and research activities in 6G.This study has examined the Scopus database through a bibliometric analysis of more than 1,000 papers published between 2017 and 2021.Then,we applied the bibliometric analysis methods by including(1)document type,(2)subject area,(3)author,and(4)country of publication.The study’s results reflect the research 6G community’s trends,highlight important research challenges,and elucidate potential directions for future research in this interesting area.展开更多
In this paper,we develop a 6G wireless powered Internet of Things(IoT)system assisted by unmanned aerial vehicles(UAVs)to intelligently supply energy and collect data at the same time.In our dual-UAV scheme,UAV-E,with...In this paper,we develop a 6G wireless powered Internet of Things(IoT)system assisted by unmanned aerial vehicles(UAVs)to intelligently supply energy and collect data at the same time.In our dual-UAV scheme,UAV-E,with a constant power supply,transmits energy to charge the IoT devices on the ground,whereas UAV-B serves the IoT devices by data collection as a base station.In this framework,the system's energy efficiency is maximized,which we define as a ratio of the sum rate of IoT devices to the energy consumption of two UAVs during a fixed working duration.With the constraints of duration,transmit power,energy,and mobility,a difficult non-convex issue is presented by optimizing the trajectory,time duration allocation,and uplink transmit power of concurrently.To tackle the non-convex fractional optimization issue,we deconstruct it into three subproblems and we solve each of them iteratively using the descent method in conjunction with sequential convex approximation(SCA)approaches and the Dinkelbach algorithm.The simulation findings indicate that the suggested cooperative design has the potential to greatly increase the energy efficiency of the 6G intelligent UAV-assisted wireless powered IoT system when compared to previous benchmark systems.展开更多
Future 6G communications are envisioned to enable a large catalogue of pioneering applications.These will range from networked Cyber-Physical Systems to edge computing devices,establishing real-time feedback control l...Future 6G communications are envisioned to enable a large catalogue of pioneering applications.These will range from networked Cyber-Physical Systems to edge computing devices,establishing real-time feedback control loops critical for managing Industry 5.0 deployments,digital agriculture systems,and essential infrastructures.The provision of extensive machine-type communications through 6G will render many of these innovative systems autonomous and unsupervised.While full automation will enhance industrial efficiency significantly,it concurrently introduces new cyber risks and vulnerabilities.In particular,unattended systems are highly susceptible to trust issues:malicious nodes and false information can be easily introduced into control loops.Additionally,Denialof-Service attacks can be executed by inundating the network with valueless noise.Current anomaly detection schemes require the entire transformation of the control software to integrate new steps and can only mitigate anomalies that conform to predefined mathematical models.Solutions based on an exhaustive data collection to detect anomalies are precise but extremely slow.Standard models,with their limited understanding of mobile networks,can achieve precision rates no higher than 75%.Therefore,more general and transversal protection mechanisms are needed to detect malicious behaviors transparently.This paper introduces a probabilistic trust model and control algorithm designed to address this gap.The model determines the probability of any node to be trustworthy.Communication channels are pruned for those nodes whose probability is below a given threshold.The trust control algorithmcomprises three primary phases,which feed themodel with three different probabilities,which are weighted and combined.Initially,anomalous nodes are identified using Gaussian mixture models and clustering technologies.Next,traffic patterns are studied using digital Bessel functions and the functional scalar product.Finally,the information coherence and content are analyzed.The noise content and abnormal information sequences are detected using a Volterra filter and a bank of Finite Impulse Response filters.An experimental validation based on simulation tools and environments was carried out.Results show the proposed solution can successfully detect up to 92%of malicious data injection attacks.展开更多
To ensure the extreme performances of the new 6G services,applications will be deployed at deep edge,resulting in a serious challenge of distributed application addressing.This paper traces back the latest development...To ensure the extreme performances of the new 6G services,applications will be deployed at deep edge,resulting in a serious challenge of distributed application addressing.This paper traces back the latest development of mobile network application addressing,analyzes two novel addressing methods in carrier network,and puts forward a 6G endogenous application addressing scheme by integrating some of their essence into the 6G network architecture,combining the new 6G capabilities of computing&network convergence,endogenous intelligence,and communication-sensing integration.This paper further illustrates how that the proposed method works in 6G networks and gives preliminary experimental verification.展开更多
Intelligence and perception are two operative technologies in 6G scenarios.The intelligent wireless network and information perception require a deep fusion of artificial intelligence(AI)and wireless communications in...Intelligence and perception are two operative technologies in 6G scenarios.The intelligent wireless network and information perception require a deep fusion of artificial intelligence(AI)and wireless communications in 6G systems.Therefore,fusion is becoming a typical feature and key challenge of 6G wireless communication systems.In this paper,we focus on the critical issues and propose three application scenarios in 6G wireless systems.Specifically,we first discuss the fusion of AI and 6G networks for the enhancement of 5G-advanced technology and future wireless communication systems.Then,we introduce the wireless AI technology architecture with 6G multidimensional information perception,which includes the physical layer technology of multi-dimensional feature information perception,full spectrum fusion technology,and intelligent wireless resource management.The discussion of key technologies for intelligent 6G wireless network networks is expected to provide a guideline for future research.展开更多
With the evolution of the sixth generation(6G)mobile communication technology,ample attention has gone to the integrated terrestrial-satellite networks.This paper notes that four typical application scenarios of integ...With the evolution of the sixth generation(6G)mobile communication technology,ample attention has gone to the integrated terrestrial-satellite networks.This paper notes that four typical application scenarios of integrated terrestrial-satellite networks are integrated into ultra dense satellite-enabled 6G networks architecture.Then the subchannel and power allocation schemes for the downlink of the ultra dense satellite-enabled 6G heterogeneous networks are introduced.Satellite mobile edge computing(SMEC)with edge caching in three-layer heterogeneous networks serves to reduce the link traffic of networks.Furthermore,a scheme for interference management is presented,involving quality-of-service(QoS)and co-tier/cross-tier interference constraints.The simulation results show that the proposed schemes can significantly increase the total capacity of ultra dense satellite-enabled 6G heterogeneous networks.展开更多
In recent years,the need for a fast,efficient and a reliable wireless network has increased dramatically.Numerous 5G networks have already been tested while a few are in the early stages of deployment.In noncooperativ...In recent years,the need for a fast,efficient and a reliable wireless network has increased dramatically.Numerous 5G networks have already been tested while a few are in the early stages of deployment.In noncooperative communication scenarios,the recognition of digital signal modulations assists people in identifying the communication targets and ensures an effective management over them.The recent advancements in both Machine Learning(ML)and Deep Learning(DL)models demand the development of effective modulation recognition models with self-learning capability.In this background,the current research article designs aDeep Learning enabled Intelligent Modulation Recognition of Communication Signal(DLIMR-CS)technique for next-generation networks.The aim of the proposed DLIMR-CS technique is to classify different kinds of digitally-modulated signals.In addition,the fractal feature extraction process is appliedwith the help of the Sevcik Fractal Dimension(SFD)approach.Then,the extracted features are fed into the Deep Variational Autoencoder(DVAE)model for the classification of the modulated signals.In order to improve the classification performance of the DVAE model,the Tunicate Swarm Algorithm(TSA)is used to finetune the hyperparameters involved in DVAE model.A wide range of simulations was conducted to establish the enhanced performance of the proposed DLIMR-CS model.The experimental outcomes confirmed the superior recognition rate of the DLIMR-CS model over recent state-of-the-art methods under different evaluation parameters.展开更多
N6-methyladenosine(m^(6)A)RNA modification is a conserved mechanism that regulates the fate of RNA across eukaryotic organisms.Despite its significance,a comprehensive analysis of m^(6)A-related genes in non-model pla...N6-methyladenosine(m^(6)A)RNA modification is a conserved mechanism that regulates the fate of RNA across eukaryotic organisms.Despite its significance,a comprehensive analysis of m^(6)A-related genes in non-model plants,such as kiwifruit,is lacking.Here,we identified 36 m^(6)A-related genes in the kiwifruit genome according to homology and phylogenetic inference.We performed bioinformatics and evolutionary analyses of the writer,eraser,and reader families of m^(6)A modification.Reanalysis of public RNA-seq data collected from samples under various biotic and abiotic stresses indicated that most m^(6)A-related genes were remarkably expressed under different conditions.Through construction of gene co-expression networks,we found significant correlations between several m^(6)A-related genes and transcription factors(TFs)as well as receptor-like genes during the development and ripening of kiwifruit.Furthermore,we performed ATAC-seq assays on diverse kiwifruit tissues to investigate the regulatory mechanisms of m^(6)A-related genes.We identified 10 common open chromatin regions that were present in at least two tissues,and these regions might serve as potential binding sites for MADS protein,C2H2 protein,and other predicted TFs.Our study offers comprehensive insights into the gene family of m^(6)A-related components in kiwifruit,which will lay foundation for exploring mechanisms of post-transcriptional regulation involved in development and adaptation of kiwifruit.展开更多
6G is envisioned as the next generation of wireless communication technology,promising unprecedented data speeds,ultra-low Latency,and ubiquitous Connectivity.In tandem with these advancements,blockchain technology is...6G is envisioned as the next generation of wireless communication technology,promising unprecedented data speeds,ultra-low Latency,and ubiquitous Connectivity.In tandem with these advancements,blockchain technology is leveraged to enhance computer vision applications’security,trustworthiness,and transparency.With the widespread use of mobile devices equipped with cameras,the ability to capture and recognize Chinese characters in natural scenes has become increasingly important.Blockchain can facilitate privacy-preserving mechanisms in applications where privacy is paramount,such as facial recognition or personal healthcare monitoring.Users can control their visual data and grant or revoke access as needed.Recognizing Chinese characters from images can provide convenience in various aspects of people’s lives.However,traditional Chinese character text recognition methods often need higher accuracy,leading to recognition failures or incorrect character identification.In contrast,computer vision technologies have significantly improved image recognition accuracy.This paper proposed a Secure end-to-end recognition system(SE2ERS)for Chinese characters in natural scenes based on convolutional neural networks(CNN)using 6G technology.The proposed SE2ERS model uses the Weighted Hyperbolic Curve Cryptograph(WHCC)of the secure data transmission in the 6G network with the blockchain model.The data transmission within the computer vision system,with a 6G gradient directional histogram(GDH),is employed for character estimation.With the deployment of WHCC and GDH in the constructed SE2ERS model,secure communication is achieved for the data transmission with the 6G network.The proposed SE2ERS compares the performance of traditional Chinese text recognition methods and data transmission environment with 6G communication.Experimental results demonstrate that SE2ERS achieves an average recognition accuracy of 88%for simple Chinese characters,compared to 81.2%with traditional methods.For complex Chinese characters,the average recognition accuracy improves to 84.4%with our system,compared to 72.8%with traditional methods.Additionally,deploying the WHCC model improves data security with the increased data encryption rate complexity of∼12&higher than the traditional techniques.展开更多
文章以临夏现代职业学院校园网互联网协议版本6(Internet Protocol version 6,IPv6)升级改造为例,介绍互联网协议版本4(Internet Protocol version 4,IPv4)校园网现状和存在的问题,比较IPv4与IPv6的优缺点,结合IPv6迁移改造的双协议栈...文章以临夏现代职业学院校园网互联网协议版本6(Internet Protocol version 6,IPv6)升级改造为例,介绍互联网协议版本4(Internet Protocol version 4,IPv4)校园网现状和存在的问题,比较IPv4与IPv6的优缺点,结合IPv6迁移改造的双协议栈、隧道技术,探索规划阶段性升级改造IPv6的建设方案,重点讨论IPv4/IPv6双栈校园网技术实现。展开更多
随着互联网用户数量的迅猛增长和物联网设备的普及,全球范围内的网络运营商和服务提供商逐步开始向网际互连协议第6版(Internet Protocol Version 6,IPv6)过渡。在这一背景下,广电网络作为重要的通信基础设施,也面临着向IPv6过渡的迫切...随着互联网用户数量的迅猛增长和物联网设备的普及,全球范围内的网络运营商和服务提供商逐步开始向网际互连协议第6版(Internet Protocol Version 6,IPv6)过渡。在这一背景下,广电网络作为重要的通信基础设施,也面临着向IPv6过渡的迫切需求。基于此,深入分析广电网络向IPv6过渡的技术挑战并提出针对性的解决方案,为未来的广电网络发展提供参考。展开更多
5G环境下的互联网协议第6版(Internet Protocol Version 6,IPv6)网络面临着诸多安全挑战和隐私风险,包括数据窃取、身份盗用及网络攻击等,对用户隐私保护提出了更高的要求。因此,探索适用于IPv6的区域性数据加密技术和隐私保护策略显得...5G环境下的互联网协议第6版(Internet Protocol Version 6,IPv6)网络面临着诸多安全挑战和隐私风险,包括数据窃取、身份盗用及网络攻击等,对用户隐私保护提出了更高的要求。因此,探索适用于IPv6的区域性数据加密技术和隐私保护策略显得尤为重要。文章探讨了5G环境下IPv6网络面临的安全挑战和隐私风险,分析多种区域性数据加密和网络隐私保护策略,为实现更安全、更私密的网络通信环境提供理论依据和实践指南。展开更多
文章主要探讨了医院网际互连协议第4版(Internet Protocol version 4,IPv4)网络向网际互连协议第6版(Internet Protocol version 6,IPv6)网络过渡的通信技术应用,重点分析了双栈技术、隧道技术以及转换技术在过渡过程中的应用。通过华为...文章主要探讨了医院网际互连协议第4版(Internet Protocol version 4,IPv4)网络向网际互连协议第6版(Internet Protocol version 6,IPv6)网络过渡的通信技术应用,重点分析了双栈技术、隧道技术以及转换技术在过渡过程中的应用。通过华为eNSP模拟器构建双栈网络环境,并进行多项测试验证其可行性。结果表明,双栈技术能有效支持IPv4和IPv6协议共存,为医院网络现代化提供技术保障。同时,研究强调在过渡过程中需考虑的安全挑战和设备升级问题,提出了具体的实施策略和优化建议。展开更多
基金The authors received Universiti Malaysia Pahang Al-Sultan Abdullah(UMPSA)grant under Internal Research Grant with Grant Number PDU223209.Author received grant is:Ahmad Firdaus Website of the sponsor:https://www.ump.edu.my/en.
文摘The race to develop the next generation of wireless networks,known as Sixth Generation(6G)wireless,which will be operational in 2030,has already begun.To realize its full potential over the next decade,6G will undoubtedly necessitate additional improvements that integrate existing solutions with cutting-edge ones.However,the studies about 6G are mainly limited and scattered,whereas no bibliometric study covers the 6G field.Thus,this study aims to review,examine,and summarize existing studies and research activities in 6G.This study has examined the Scopus database through a bibliometric analysis of more than 1,000 papers published between 2017 and 2021.Then,we applied the bibliometric analysis methods by including(1)document type,(2)subject area,(3)author,and(4)country of publication.The study’s results reflect the research 6G community’s trends,highlight important research challenges,and elucidate potential directions for future research in this interesting area.
基金supported by the Natural Science Foundation of Beijing Municipality under Grant L192034。
文摘In this paper,we develop a 6G wireless powered Internet of Things(IoT)system assisted by unmanned aerial vehicles(UAVs)to intelligently supply energy and collect data at the same time.In our dual-UAV scheme,UAV-E,with a constant power supply,transmits energy to charge the IoT devices on the ground,whereas UAV-B serves the IoT devices by data collection as a base station.In this framework,the system's energy efficiency is maximized,which we define as a ratio of the sum rate of IoT devices to the energy consumption of two UAVs during a fixed working duration.With the constraints of duration,transmit power,energy,and mobility,a difficult non-convex issue is presented by optimizing the trajectory,time duration allocation,and uplink transmit power of concurrently.To tackle the non-convex fractional optimization issue,we deconstruct it into three subproblems and we solve each of them iteratively using the descent method in conjunction with sequential convex approximation(SCA)approaches and the Dinkelbach algorithm.The simulation findings indicate that the suggested cooperative design has the potential to greatly increase the energy efficiency of the 6G intelligent UAV-assisted wireless powered IoT system when compared to previous benchmark systems.
基金funding by Comunidad de Madrid within the framework of the Multiannual Agreement with Universidad Politécnica de Madrid to encourage research by young doctors(PRINCE project).
文摘Future 6G communications are envisioned to enable a large catalogue of pioneering applications.These will range from networked Cyber-Physical Systems to edge computing devices,establishing real-time feedback control loops critical for managing Industry 5.0 deployments,digital agriculture systems,and essential infrastructures.The provision of extensive machine-type communications through 6G will render many of these innovative systems autonomous and unsupervised.While full automation will enhance industrial efficiency significantly,it concurrently introduces new cyber risks and vulnerabilities.In particular,unattended systems are highly susceptible to trust issues:malicious nodes and false information can be easily introduced into control loops.Additionally,Denialof-Service attacks can be executed by inundating the network with valueless noise.Current anomaly detection schemes require the entire transformation of the control software to integrate new steps and can only mitigate anomalies that conform to predefined mathematical models.Solutions based on an exhaustive data collection to detect anomalies are precise but extremely slow.Standard models,with their limited understanding of mobile networks,can achieve precision rates no higher than 75%.Therefore,more general and transversal protection mechanisms are needed to detect malicious behaviors transparently.This paper introduces a probabilistic trust model and control algorithm designed to address this gap.The model determines the probability of any node to be trustworthy.Communication channels are pruned for those nodes whose probability is below a given threshold.The trust control algorithmcomprises three primary phases,which feed themodel with three different probabilities,which are weighted and combined.Initially,anomalous nodes are identified using Gaussian mixture models and clustering technologies.Next,traffic patterns are studied using digital Bessel functions and the functional scalar product.Finally,the information coherence and content are analyzed.The noise content and abnormal information sequences are detected using a Volterra filter and a bank of Finite Impulse Response filters.An experimental validation based on simulation tools and environments was carried out.Results show the proposed solution can successfully detect up to 92%of malicious data injection attacks.
基金supported by the National Key R&D Program of China(Project Number:2022YFB2902100).
文摘To ensure the extreme performances of the new 6G services,applications will be deployed at deep edge,resulting in a serious challenge of distributed application addressing.This paper traces back the latest development of mobile network application addressing,analyzes two novel addressing methods in carrier network,and puts forward a 6G endogenous application addressing scheme by integrating some of their essence into the 6G network architecture,combining the new 6G capabilities of computing&network convergence,endogenous intelligence,and communication-sensing integration.This paper further illustrates how that the proposed method works in 6G networks and gives preliminary experimental verification.
文摘Intelligence and perception are two operative technologies in 6G scenarios.The intelligent wireless network and information perception require a deep fusion of artificial intelligence(AI)and wireless communications in 6G systems.Therefore,fusion is becoming a typical feature and key challenge of 6G wireless communication systems.In this paper,we focus on the critical issues and propose three application scenarios in 6G wireless systems.Specifically,we first discuss the fusion of AI and 6G networks for the enhancement of 5G-advanced technology and future wireless communication systems.Then,we introduce the wireless AI technology architecture with 6G multidimensional information perception,which includes the physical layer technology of multi-dimensional feature information perception,full spectrum fusion technology,and intelligent wireless resource management.The discussion of key technologies for intelligent 6G wireless network networks is expected to provide a guideline for future research.
基金supported in part by the National Key R&D Program of China(2020YFB1806103)the National Natural Science Foundation of China under Grant 62225103 and U22B2003+1 种基金Beijing Natural Science Foundation(L212004)China University Industry-University-Research Collaborative Innovation Fund(2021FNA05001).
文摘With the evolution of the sixth generation(6G)mobile communication technology,ample attention has gone to the integrated terrestrial-satellite networks.This paper notes that four typical application scenarios of integrated terrestrial-satellite networks are integrated into ultra dense satellite-enabled 6G networks architecture.Then the subchannel and power allocation schemes for the downlink of the ultra dense satellite-enabled 6G heterogeneous networks are introduced.Satellite mobile edge computing(SMEC)with edge caching in three-layer heterogeneous networks serves to reduce the link traffic of networks.Furthermore,a scheme for interference management is presented,involving quality-of-service(QoS)and co-tier/cross-tier interference constraints.The simulation results show that the proposed schemes can significantly increase the total capacity of ultra dense satellite-enabled 6G heterogeneous networks.
文摘In recent years,the need for a fast,efficient and a reliable wireless network has increased dramatically.Numerous 5G networks have already been tested while a few are in the early stages of deployment.In noncooperative communication scenarios,the recognition of digital signal modulations assists people in identifying the communication targets and ensures an effective management over them.The recent advancements in both Machine Learning(ML)and Deep Learning(DL)models demand the development of effective modulation recognition models with self-learning capability.In this background,the current research article designs aDeep Learning enabled Intelligent Modulation Recognition of Communication Signal(DLIMR-CS)technique for next-generation networks.The aim of the proposed DLIMR-CS technique is to classify different kinds of digitally-modulated signals.In addition,the fractal feature extraction process is appliedwith the help of the Sevcik Fractal Dimension(SFD)approach.Then,the extracted features are fed into the Deep Variational Autoencoder(DVAE)model for the classification of the modulated signals.In order to improve the classification performance of the DVAE model,the Tunicate Swarm Algorithm(TSA)is used to finetune the hyperparameters involved in DVAE model.A wide range of simulations was conducted to establish the enhanced performance of the proposed DLIMR-CS model.The experimental outcomes confirmed the superior recognition rate of the DLIMR-CS model over recent state-of-the-art methods under different evaluation parameters.
基金the Natural Science Foundation of Zhejiang province(Grant Nos.LQ23C150003,LR23C150001)the National Natural Science Foundation of China(NSFC)(Grant No.32102318)NSFC Excellent Young Scientists Fund.
文摘N6-methyladenosine(m^(6)A)RNA modification is a conserved mechanism that regulates the fate of RNA across eukaryotic organisms.Despite its significance,a comprehensive analysis of m^(6)A-related genes in non-model plants,such as kiwifruit,is lacking.Here,we identified 36 m^(6)A-related genes in the kiwifruit genome according to homology and phylogenetic inference.We performed bioinformatics and evolutionary analyses of the writer,eraser,and reader families of m^(6)A modification.Reanalysis of public RNA-seq data collected from samples under various biotic and abiotic stresses indicated that most m^(6)A-related genes were remarkably expressed under different conditions.Through construction of gene co-expression networks,we found significant correlations between several m^(6)A-related genes and transcription factors(TFs)as well as receptor-like genes during the development and ripening of kiwifruit.Furthermore,we performed ATAC-seq assays on diverse kiwifruit tissues to investigate the regulatory mechanisms of m^(6)A-related genes.We identified 10 common open chromatin regions that were present in at least two tissues,and these regions might serve as potential binding sites for MADS protein,C2H2 protein,and other predicted TFs.Our study offers comprehensive insights into the gene family of m^(6)A-related components in kiwifruit,which will lay foundation for exploring mechanisms of post-transcriptional regulation involved in development and adaptation of kiwifruit.
基金supported by the Inner Mongolia Natural Science Fund Project(2019MS06013)Ordos Science and Technology Plan Project(2022YY041)Hunan Enterprise Science and Technology Commissioner Program(2021GK5042).
文摘6G is envisioned as the next generation of wireless communication technology,promising unprecedented data speeds,ultra-low Latency,and ubiquitous Connectivity.In tandem with these advancements,blockchain technology is leveraged to enhance computer vision applications’security,trustworthiness,and transparency.With the widespread use of mobile devices equipped with cameras,the ability to capture and recognize Chinese characters in natural scenes has become increasingly important.Blockchain can facilitate privacy-preserving mechanisms in applications where privacy is paramount,such as facial recognition or personal healthcare monitoring.Users can control their visual data and grant or revoke access as needed.Recognizing Chinese characters from images can provide convenience in various aspects of people’s lives.However,traditional Chinese character text recognition methods often need higher accuracy,leading to recognition failures or incorrect character identification.In contrast,computer vision technologies have significantly improved image recognition accuracy.This paper proposed a Secure end-to-end recognition system(SE2ERS)for Chinese characters in natural scenes based on convolutional neural networks(CNN)using 6G technology.The proposed SE2ERS model uses the Weighted Hyperbolic Curve Cryptograph(WHCC)of the secure data transmission in the 6G network with the blockchain model.The data transmission within the computer vision system,with a 6G gradient directional histogram(GDH),is employed for character estimation.With the deployment of WHCC and GDH in the constructed SE2ERS model,secure communication is achieved for the data transmission with the 6G network.The proposed SE2ERS compares the performance of traditional Chinese text recognition methods and data transmission environment with 6G communication.Experimental results demonstrate that SE2ERS achieves an average recognition accuracy of 88%for simple Chinese characters,compared to 81.2%with traditional methods.For complex Chinese characters,the average recognition accuracy improves to 84.4%with our system,compared to 72.8%with traditional methods.Additionally,deploying the WHCC model improves data security with the increased data encryption rate complexity of∼12&higher than the traditional techniques.
文摘文章以临夏现代职业学院校园网互联网协议版本6(Internet Protocol version 6,IPv6)升级改造为例,介绍互联网协议版本4(Internet Protocol version 4,IPv4)校园网现状和存在的问题,比较IPv4与IPv6的优缺点,结合IPv6迁移改造的双协议栈、隧道技术,探索规划阶段性升级改造IPv6的建设方案,重点讨论IPv4/IPv6双栈校园网技术实现。
文摘随着互联网用户数量的迅猛增长和物联网设备的普及,全球范围内的网络运营商和服务提供商逐步开始向网际互连协议第6版(Internet Protocol Version 6,IPv6)过渡。在这一背景下,广电网络作为重要的通信基础设施,也面临着向IPv6过渡的迫切需求。基于此,深入分析广电网络向IPv6过渡的技术挑战并提出针对性的解决方案,为未来的广电网络发展提供参考。
文摘5G环境下的互联网协议第6版(Internet Protocol Version 6,IPv6)网络面临着诸多安全挑战和隐私风险,包括数据窃取、身份盗用及网络攻击等,对用户隐私保护提出了更高的要求。因此,探索适用于IPv6的区域性数据加密技术和隐私保护策略显得尤为重要。文章探讨了5G环境下IPv6网络面临的安全挑战和隐私风险,分析多种区域性数据加密和网络隐私保护策略,为实现更安全、更私密的网络通信环境提供理论依据和实践指南。
文摘文章主要探讨了医院网际互连协议第4版(Internet Protocol version 4,IPv4)网络向网际互连协议第6版(Internet Protocol version 6,IPv6)网络过渡的通信技术应用,重点分析了双栈技术、隧道技术以及转换技术在过渡过程中的应用。通过华为eNSP模拟器构建双栈网络环境,并进行多项测试验证其可行性。结果表明,双栈技术能有效支持IPv4和IPv6协议共存,为医院网络现代化提供技术保障。同时,研究强调在过渡过程中需考虑的安全挑战和设备升级问题,提出了具体的实施策略和优化建议。