In responding to the“dual carbon”strategy,intelligent networked new energy vehicle technology plays a crucial role.This type of vehicle combines the advantages of new energy technology and intelligent network techno...In responding to the“dual carbon”strategy,intelligent networked new energy vehicle technology plays a crucial role.This type of vehicle combines the advantages of new energy technology and intelligent network technology,effectively reduces carbon emissions in the transportation sector,improves energy utilization efficiency,and contributes to the green transportation system through intelligent transportation management and collaborative work between vehicles,making significant contributions.This article aims to explore the development of intelligent network-connected new energy vehicle technology and applications under the dual-carbon strategy and lay the foundation for the future development direction of the automotive industry.展开更多
A large number of Web APIs have been released as services in mobile communications,but the service provided by a single Web API is usually limited.To enrich the services in mobile communications,developers have combin...A large number of Web APIs have been released as services in mobile communications,but the service provided by a single Web API is usually limited.To enrich the services in mobile communications,developers have combined Web APIs and developed a new service,which is known as a mashup.The emergence of mashups greatly increases the number of services in mobile communications,especially in mobile networks and the Internet-of-Things(IoT),and has encouraged companies and individuals to develop even more mashups,which has led to the dramatic increase in the number of mashups.Such a trend brings with it big data,such as the massive text data from the mashups themselves and continually-generated usage data.Thus,the question of how to determine the most suitable mashups from big data has become a challenging problem.In this paper,we propose a mashup recommendation framework from big data in mobile networks and the IoT.The proposed framework is driven by machine learning techniques,including neural embedding,clustering,and matrix factorization.We employ neural embedding to learn the distributed representation of mashups and propose to use cluster analysis to learn the relationship among the mashups.We also develop a novel Joint Matrix Factorization(JMF)model to complete the mashup recommendation task,where we design a new objective function and an optimization algorithm.We then crawl through a real-world large mashup dataset and perform experiments.The experimental results demonstrate that our framework achieves high accuracy in mashup recommendation and performs better than all compared baselines.展开更多
With the rapid development of electronic communication technology,various new technical elements are constantly added to it,bringing many changes to people’s lives and work.The traditional data diversion mode can no ...With the rapid development of electronic communication technology,various new technical elements are constantly added to it,bringing many changes to people’s lives and work.The traditional data diversion mode can no longer truly meet the needs of actual work,and the electronic communication mode plays a huge role and occupies an important position in the communication market.Regarding how to develop and apply intelligent electronic communication technology more perfectly,there will be an overview of the specific principle of intelligent electronic communication technology,from the multi-faceted impact of electronic communication technology on human society.The article put forward the future development trend of electronic communication technology based on intelligent networks,emphasized expanding the scale of technology coverage,improved the comprehensive quality of technical products,optimized the structure of the communication industry,and formed a perfect industrial chain,so as to improve the intelligent level of electronic communication technology.展开更多
Recently,the fifth generation(5G)of mobile networks has been deployed and various ranges of mobile services have been provided.The 5G mobile network supports improved mobile broadband,ultra-low latency and densely dep...Recently,the fifth generation(5G)of mobile networks has been deployed and various ranges of mobile services have been provided.The 5G mobile network supports improved mobile broadband,ultra-low latency and densely deployed massive devices.It allows multiple radio access technologies and interworks them for services.5G mobile systems employ traffic steering techniques to efficiently use multiple radio access technologies.However,conventional traffic steering techniques do not consider dynamic network conditions efficiently.In this paper,we propose a network aided traffic steering technique in 5G mobile network architecture.5G mobile systems monitor network conditions and learn with network data.Through a machine learning algorithm such as a feed-forward neural network,it recognizes dynamic network conditions and then performs traffic steering.The proposed scheme controls traffic for multiple radio access according to the ratio of measured throughput.Thus,it can be expected to improve traffic steering efficiency.The performance of the proposed traffic steering scheme is evaluated using extensive computer simulations.展开更多
The year of 2014 saw the beginning of China's LTE,which marks that China has become one of the major engines for the global LTE development.China dazzled in the construction of LTE networks,subscribers,and industr...The year of 2014 saw the beginning of China's LTE,which marks that China has become one of the major engines for the global LTE development.China dazzled in the construction of LTE networks,subscribers,and industry chain.However,the policy formulated around TD-LTE also put China in predicament and brought it many challenges.With this article,we are going to put China's market for mobile broadband networks into perspective,focusing on the development of China's LTE market,challenges that encountered,and the research in this area in the years to come.Besides,in regards to the problems that already appeared,we will,from policy-making,industry-level,and technological points of view,offer our suggestions on how China should do to make this market robust.展开更多
The rise of the Internet of Things and autonomous systems has made connecting vehicles more critical.Connected autonomous vehicles can create diverse communication networks that can improve the environment and offer c...The rise of the Internet of Things and autonomous systems has made connecting vehicles more critical.Connected autonomous vehicles can create diverse communication networks that can improve the environment and offer contemporary applications.With the advent of Fifth Generation(5G)networks,vehicle-to-everything(V2X)networks are expected to be highly intelligent,reside on superfast,reliable,and low-latency connections.Network slicing,machine learning(ML),and deep learning(DL)are related to network automation and optimization in V2X communication.ML/DL with network slicing aims to optimize the performance,reliability of the V2X networks,personalized services,costs,and scalability,and thus,it enhances the overall driving experience.These advantages can ultimately lead to a safer and more efficient transportation system.However,existing long-term evolution systems and enabling 5G technologies cannot meet such dynamic requirements without adding higher complexity levels.ML algorithms mitigate complexity levels,which can be highly instrumental in such vehicular communication systems.This study aims to review V2X slicing based on a proposed taxonomy that describes the enablers of slicing,a different configuration of slicing,the requirements of slicing,and the ML algorithm used to control and manage to slice.This study also reviews various research works established in network slicing through ML algorithms to enable V2X communication use cases,focusing on V2X network slicing and considering efficient control and management.The enabler technologies are considered in light of the network requirements,particular configurations,and the underlying methods and algorithms,with a review of some critical challenges and possible solutions available.The paper concludes with a future roadmap by discussing some open research issues and future directions.展开更多
The 5 th generation(5 G)mobile networks has been put into services across a number of markets,which aims at providing subscribers with high bit rates,low latency,high capacity,many new services and vertical applicatio...The 5 th generation(5 G)mobile networks has been put into services across a number of markets,which aims at providing subscribers with high bit rates,low latency,high capacity,many new services and vertical applications.Therefore the research and development on 6 G have been put on the agenda.Regarding demands and characteristics of future 6 G,artificial intelligence(A),big data(B)and cloud computing(C)will play indispensable roles in achieving the highest efficiency and the largest benefits.Interestingly,the initials of these three aspects remind us the significance of vitamin ABC to human body.In this article we specifically expound on the three elements of ABC and relationships in between.We analyze the basic characteristics of wireless big data(WBD)and the corresponding technical action in A and C,which are the high dimensional feature and spatial separation,the predictive ability,and the characteristics of knowledge.Based on the abilities of WBD,a new learning approach for wireless AI called knowledge+data-driven deep learning(KD-DL)method,and a layered computing architecture of mobile network integrating cloud/edge/terminal computing,is proposed,and their achievable efficiency is discussed.These progress will be conducive to the development of future 6 G.展开更多
Mobile broadband(MBB)networks are expanding rapidly to deliver higher data speeds.The fifth-generation cellular network promises enhanced-MBB with high-speed data rates,low power connectivity,and ultralow latency vide...Mobile broadband(MBB)networks are expanding rapidly to deliver higher data speeds.The fifth-generation cellular network promises enhanced-MBB with high-speed data rates,low power connectivity,and ultralow latency video streaming.However,existing cellular networks are unable to perform well due to high latency and low bandwidth,which degrades the performance of various applications.As a result,monitoring and evaluation of the performance of these network-supported services is critical.Mobile network providers optimize and monitor their network performance to ensure the highest quality of service to their end-users.This paper proposes a Bayesian model to estimate the minimum opinion score(MOS)of video streaming services for any particular cellular network.The MOS is the most commonly used metric to assess the quality of experience.The proposed Bayesian model consists of several input data,namely,round-trip time,stalling load,and bite rates.It was examined and evaluated using several test data sizes with various performance metrics.Simulation results show the proposed Bayesian network achieved higher accuracy overall test data sizes than a neural network.The proposed Bayesian network obtained a remarkable overall accuracy of 90.36%and outperformed the neural network.展开更多
In the paper, we illustrate the importance of the concept of mobile network computer from a technological perspective. Because of the usefulness of mobile network computers, with the growth of the Internet of things, ...In the paper, we illustrate the importance of the concept of mobile network computer from a technological perspective. Because of the usefulness of mobile network computers, with the growth of the Internet of things, mobile network computers may include not only TV box audio-visual equipment, wireless household appliances, and mobile communication equipment, but may also include devices such as intelligent foot rings, smart watches, smart glasses, smart shoes and smart coats. Considering the different types of networks, e.g. IP multimedia Subsystem(IMS), we explain why some network elements are inaccurate and misleading from a technological perspective. We aim to popularize the concept of mobile network computers for its accuracy and importance, which better define modern mobile terminals and reflects the nature of multiple mobile terminals based on the structure of their integrated computers and the capabilities of processing multimedia. In the computer and Internet age, network computers and mobile network computers are the main terminals of fixed and mobile networks, respectively. Therefore, based on the concept of mobile network computers, we discuss the future of information society.展开更多
Protocols for authentication and key establishment have special requirements in a wireless environment. This paper presents a new key agreement protocol HAKA (home server aided key agreement) for roaming scenario. I...Protocols for authentication and key establishment have special requirements in a wireless environment. This paper presents a new key agreement protocol HAKA (home server aided key agreement) for roaming scenario. It is carried out by a mobile user and a foreign server with the aid of a home server, which provides all necessary authentications of the three parties. The session key can be obtained by no one except for the mobile user and the foreign server. HAKA is based on Diffie-Hellman key exchange and a secure hash function without using any asymmetric encryption. The protocol is proved secure in Canetti-Krawczyk (CK) model.展开更多
Hypertext transfer protocol(HTTP) adaptive streaming(HAS) plays a key role in mobile video transmission. Considering the multi-segment and multi-rate features of HAS, this paper proposes a buffer-driven resource manag...Hypertext transfer protocol(HTTP) adaptive streaming(HAS) plays a key role in mobile video transmission. Considering the multi-segment and multi-rate features of HAS, this paper proposes a buffer-driven resource management(BDRM) method to enhance HAS quality of experience(QoE) in mobile network. Different from the traditional methods only focusing on base station side without considering the buffer, the proposed method takes both station and client sides into account and end user's buffer plays as the drive of whole schedule process. The proposed HAS QoE influencing factors are composed of initial delay, rebuffering and quality level. The BDRM method decomposes the HAS QoE maximization problem into client and base station sides separately to solve it in multicell and multi-user video playing scene in mobile network. In client side, the decision is made based on buffer probe and rate request algorithm by each user separately. It guarantees the less rebuffering events and decides which HAS segment rate to fetch. While, in the base station side, the schedule of wireless resource is made to maximize the quality level of all access clients and decides the final rate pulled from HAS server. The drive of buffer and twice rate request schemes make BDRMtake full advantage of HAS's multi-segment and multi-rate features. As to the simulation results, compared with proportional fair(PF), Max C/I and traditional HAS schedule(THS) methods, the proposed BDRM method decreases rebuffering percent to 1.96% from 11.1% with PF and from 7.01% with THS and increases the mean MOS of all users to 3.94 from 3.42 with PF method and from 2.15 with Max C/I method. It also guarantees a high fairness with 0.98 from the view of objective and subjective assessment metrics.展开更多
The rapid growth of 3G/4G enabled devices such as smartphones and tablets in large numbers has created increased demand for mobile data services. Wi-Fi offloading helps satisfy the requirements of data-rich applicatio...The rapid growth of 3G/4G enabled devices such as smartphones and tablets in large numbers has created increased demand for mobile data services. Wi-Fi offloading helps satisfy the requirements of data-rich applications and terminals with improved multi- media. Wi-Fi is an essential approach to alleviating mobile data traffic load on a cellular network because it provides extra capacity and improves overall performance. In this paper, we propose an integrated LTE/Wi-Fi architecture with software-defined networking (SDN) abstraction in mobile baekhaul and enhanced components that facilitate the move towards next-generation 5G mo- bile networks. Our proposed architecture enables programmable offloading policies that take into account real-time network conditions as well as the status of devices and applications. This mechanism improves overall network performance by deriving real- time policies and steering traffic between cellular and Wi-Fi networks more efficiently.展开更多
A new approximation of fair queuing called Compensating Hound Robin (CRR) is presented in this paper. The algorithm uses packet-by-packet scheduler with a compensating measure. It achieves good fairness in terms of th...A new approximation of fair queuing called Compensating Hound Robin (CRR) is presented in this paper. The algorithm uses packet-by-packet scheduler with a compensating measure. It achieves good fairness in terms of throughput, requires only O( I) time complexity to process a packet, and is simple enough to be implemented in hardware. After the performances are analyzed, the fairness and packet loss rate of the algorithm are simulated. Simulation results show that the CRR can effectively isolate the effects of contending .sources.展开更多
With the increasing popularity of wireless sensor network and GPS ( global positioning system), uncertain data as a new type of data brings a new challenge for the traditional data processing methods. Data broadcast...With the increasing popularity of wireless sensor network and GPS ( global positioning system), uncertain data as a new type of data brings a new challenge for the traditional data processing methods. Data broadcast is an effective means for data dissemination in mobile networks. In this paper, the def'mition of the mean uncertainty ratio of data is presented and a broadcasting scheme is proposed for uncertain data dissemination. Simulation results show that the scheme can reduce the uncertainty of the broadcasted uncertain data effectively at the cost of a minor increase in data access time, in the case of no transmission error and presence of transmission errors. As a result, lower uncertainty of data benefits the qualifies of the query results based on the data.展开更多
The Intermittently Connected Mobile Networks (ICMN) is a disconnected mobile network where a complete connectivity never exists. More number of moving nodes makes them impenetrable genre which in turn makes the n...The Intermittently Connected Mobile Networks (ICMN) is a disconnected mobile network where a complete connectivity never exists. More number of moving nodes makes them impenetrable genre which in turn makes the network intermittently connected. Detection of malicious node and routing is onerous due to its genre. In this paper, we put forward a secure routing that aids in detecting and preventing intrusion of malicious nodes. The routing process is made more adorable through Bee Colony Optimization (BCO). The amalgamation of BCO with authentication series leads a novel routing protocol named Privacy Preserving Bee Routing Protocol (PPBRP) which is highly secure. The degree of security is tested with malicious nodes in the network to prove that the proposed PPBRP ensures secure routing.展开更多
The Vertical Handover(VHO)is one of the most vital features provided for the heterogeneous mobile networks.It allows Mobile Users(MUs)to keep ongoing sessions without disruption while they continuously move between di...The Vertical Handover(VHO)is one of the most vital features provided for the heterogeneous mobile networks.It allows Mobile Users(MUs)to keep ongoing sessions without disruption while they continuously move between different Radio Access Technologies(RATs)such as Wireless Fidelity(Wi-Fi),Global System for Mobile Communication(GSM),Universal Mobile Telecommunications System(UMTS),Long Term Evolution(LTE)and Fifth Generation(5G).In order to fulfill this goal,the VHO must comply to three main phases:starting of collecting the required information and then passing it for decision phase to obtain the best available RAT for performing VHO by execution phase eventually.However,the execution phase still encounters some security issues which are exploited by hackers in launching malicious attacks such as ransomware,fragmentation,header manipulation,smurf,host initialization,reconnaissance,eavesdropping,Denial of Service(DoS),spoofing,Man in the Middle(MITM)and falsification.This paper thoroughly studies the recent security issues for hundreds VHO approaches found in the literature and comes up with a secure procedure to enhance VHO security during execution phase.A numerical analysis results of the proposed procedure are effectively evaluated in terms of security and signaling cost.Compared with the recent related work found in literature,the analysis demonstrates that the security is successfully improved by 20%whereas signaling cost is maintained as in non-proposed procedure.展开更多
Over the past years,the emergence of intelligent networks empowered by machine learning techniques has brought great facilitates to different aspects of human life.However,using machine learning in intelligent network...Over the past years,the emergence of intelligent networks empowered by machine learning techniques has brought great facilitates to different aspects of human life.However,using machine learning in intelligent networks also presents potential security and privacy threats.A common practice is the so-called poisoning attacks where malicious users inject fake training data with the aim of corrupting the learned model.In this survey,we comprehensively review existing poisoning attacks as well as the countermeasures in intelligent networks for the first time.We emphasize and compare the principles of the formal poisoning attacks employed in different categories of learning algorithms,and analyze the strengths and limitations of corresponding defense methods in a compact form.We also highlight some remaining challenges and future directions in the attack-defense confrontation to promote further research in this emerging yet promising area.展开更多
There has been an exponential rise in mobile data traffic in recent times due to the increasing popularity of portable devices like tablets,smartphones,and laptops.The rapid rise in the use of these portable devices h...There has been an exponential rise in mobile data traffic in recent times due to the increasing popularity of portable devices like tablets,smartphones,and laptops.The rapid rise in the use of these portable devices has put extreme stress on the network service providers while forcing telecommunication engineers to look for innovative solutions to meet the increased demand.One solution to the problem is the emergence of fifth-generation(5G)wireless communication,which can address the challenges by offering very broad wireless area capacity and potential cut-power consumption.The application of small cells is the fundamental mechanism for the 5Gtechnology.The use of small cells can enhance the facility for higher capacity and reuse.However,it must be noted that small cells deployment will lead to frequent handovers of mobile nodes.Considering the importance of small cells in 5G,this paper aims to examine a new resource management scheme that can work to minimize the rate of handovers formobile phones through careful resources allocation in a two-tier network.Therefore,the resource management problem has been formulated as an optimization issue thatwe aim to overcome through an optimal solution.To find a solution to the existing problem of frequent handovers,a heuristic approach has been used.This solution is then evaluated and validated through simulation and testing,during which the performance was noted to improve by 12%in the context of handover costs.Therefore,this model has been observed to be more efficient as compared to the existing model.展开更多
Acoustic scene classification(ASC)is a method of recognizing and classifying environments that employ acoustic signals.Various ASC approaches based on deep learning have been developed,with convolutional neural networ...Acoustic scene classification(ASC)is a method of recognizing and classifying environments that employ acoustic signals.Various ASC approaches based on deep learning have been developed,with convolutional neural networks(CNNs)proving to be the most reliable and commonly utilized in ASC systems due to their suitability for constructing lightweight models.When using ASC systems in the real world,model complexity and device robustness are essential considerations.In this paper,we propose a two-pass mobile network for low-complexity classification of the acoustic scene,named TP-MobNet.With inverse residuals and linear bottlenecks,TPMobNet is based on MobileNetV2,and following mobile blocks,coordinate attention and two-pass fusion approaches are utilized.The log-range dependencies and precise position information in feature maps can be trained via coordinate attention.By capturing more diverse feature resolutions at the network’s end sides,two-pass fusions can also train generalization.Also,the model size is reduced by applying weight quantization to the trained model.By adding weight quantization to the trained model,the model size is also lowered.The TAU Urban Acoustic Scenes 2020 Mobile development set was used for all of the experiments.It has been confirmed that the proposed model,with a model size of 219.6 kB,achieves an accuracy of 73.94%.展开更多
Over-the-top services and cloud services have created great challenges for telecom operators. To better meet the requirements of cloud services, we propose a decoupled network architecture. Software-defined networkin...Over-the-top services and cloud services have created great challenges for telecom operators. To better meet the requirements of cloud services, we propose a decoupled network architecture. Software-defined networking/network function virtualization (SDN/ NFV) will be vital in the construction of cloud-oriented broadband infrastructure, especially within data centers and for intercon nection between data centers. We also propose introducing SDN/NFV in the broadband access network in order to realize a virtu- alized residential gateway (VRG). We discuss the deployment modes of VRG.展开更多
文摘In responding to the“dual carbon”strategy,intelligent networked new energy vehicle technology plays a crucial role.This type of vehicle combines the advantages of new energy technology and intelligent network technology,effectively reduces carbon emissions in the transportation sector,improves energy utilization efficiency,and contributes to the green transportation system through intelligent transportation management and collaborative work between vehicles,making significant contributions.This article aims to explore the development of intelligent network-connected new energy vehicle technology and applications under the dual-carbon strategy and lay the foundation for the future development direction of the automotive industry.
基金supported by the National Key R&D Program of China (No.2021YFF0901002)the National Natural Science Foundation of China (No.61802291)+1 种基金Fundamental Research Funds for the Provincial Universities of Zhejiang (GK199900299012-025)Fundamental Research Funds for the Central Universities (No.JB210311).
文摘A large number of Web APIs have been released as services in mobile communications,but the service provided by a single Web API is usually limited.To enrich the services in mobile communications,developers have combined Web APIs and developed a new service,which is known as a mashup.The emergence of mashups greatly increases the number of services in mobile communications,especially in mobile networks and the Internet-of-Things(IoT),and has encouraged companies and individuals to develop even more mashups,which has led to the dramatic increase in the number of mashups.Such a trend brings with it big data,such as the massive text data from the mashups themselves and continually-generated usage data.Thus,the question of how to determine the most suitable mashups from big data has become a challenging problem.In this paper,we propose a mashup recommendation framework from big data in mobile networks and the IoT.The proposed framework is driven by machine learning techniques,including neural embedding,clustering,and matrix factorization.We employ neural embedding to learn the distributed representation of mashups and propose to use cluster analysis to learn the relationship among the mashups.We also develop a novel Joint Matrix Factorization(JMF)model to complete the mashup recommendation task,where we design a new objective function and an optimization algorithm.We then crawl through a real-world large mashup dataset and perform experiments.The experimental results demonstrate that our framework achieves high accuracy in mashup recommendation and performs better than all compared baselines.
文摘With the rapid development of electronic communication technology,various new technical elements are constantly added to it,bringing many changes to people’s lives and work.The traditional data diversion mode can no longer truly meet the needs of actual work,and the electronic communication mode plays a huge role and occupies an important position in the communication market.Regarding how to develop and apply intelligent electronic communication technology more perfectly,there will be an overview of the specific principle of intelligent electronic communication technology,from the multi-faceted impact of electronic communication technology on human society.The article put forward the future development trend of electronic communication technology based on intelligent networks,emphasized expanding the scale of technology coverage,improved the comprehensive quality of technical products,optimized the structure of the communication industry,and formed a perfect industrial chain,so as to improve the intelligent level of electronic communication technology.
基金This research was supported by the MSIT(Ministry of Science and ICT),Korea,under the ITRC(Information Technology Research Center)support program(IITP-2020-2015-0-00403)supervised by the IITP(Institute for Information&communications Technology Planning&Evaluation)this work was supported by the Soonchunhyang University Research Fund.
文摘Recently,the fifth generation(5G)of mobile networks has been deployed and various ranges of mobile services have been provided.The 5G mobile network supports improved mobile broadband,ultra-low latency and densely deployed massive devices.It allows multiple radio access technologies and interworks them for services.5G mobile systems employ traffic steering techniques to efficiently use multiple radio access technologies.However,conventional traffic steering techniques do not consider dynamic network conditions efficiently.In this paper,we propose a network aided traffic steering technique in 5G mobile network architecture.5G mobile systems monitor network conditions and learn with network data.Through a machine learning algorithm such as a feed-forward neural network,it recognizes dynamic network conditions and then performs traffic steering.The proposed scheme controls traffic for multiple radio access according to the ratio of measured throughput.Thus,it can be expected to improve traffic steering efficiency.The performance of the proposed traffic steering scheme is evaluated using extensive computer simulations.
文摘The year of 2014 saw the beginning of China's LTE,which marks that China has become one of the major engines for the global LTE development.China dazzled in the construction of LTE networks,subscribers,and industry chain.However,the policy formulated around TD-LTE also put China in predicament and brought it many challenges.With this article,we are going to put China's market for mobile broadband networks into perspective,focusing on the development of China's LTE market,challenges that encountered,and the research in this area in the years to come.Besides,in regards to the problems that already appeared,we will,from policy-making,industry-level,and technological points of view,offer our suggestions on how China should do to make this market robust.
基金This work was supported in part by the National Key Research and Development Program of China under Grant 2020YFB1807900the National Natural Science Foundation of China under Grant 62101306The work was also supported by Datang Linktester Technology Co.Ltd.
文摘The rise of the Internet of Things and autonomous systems has made connecting vehicles more critical.Connected autonomous vehicles can create diverse communication networks that can improve the environment and offer contemporary applications.With the advent of Fifth Generation(5G)networks,vehicle-to-everything(V2X)networks are expected to be highly intelligent,reside on superfast,reliable,and low-latency connections.Network slicing,machine learning(ML),and deep learning(DL)are related to network automation and optimization in V2X communication.ML/DL with network slicing aims to optimize the performance,reliability of the V2X networks,personalized services,costs,and scalability,and thus,it enhances the overall driving experience.These advantages can ultimately lead to a safer and more efficient transportation system.However,existing long-term evolution systems and enabling 5G technologies cannot meet such dynamic requirements without adding higher complexity levels.ML algorithms mitigate complexity levels,which can be highly instrumental in such vehicular communication systems.This study aims to review V2X slicing based on a proposed taxonomy that describes the enablers of slicing,a different configuration of slicing,the requirements of slicing,and the ML algorithm used to control and manage to slice.This study also reviews various research works established in network slicing through ML algorithms to enable V2X communication use cases,focusing on V2X network slicing and considering efficient control and management.The enabler technologies are considered in light of the network requirements,particular configurations,and the underlying methods and algorithms,with a review of some critical challenges and possible solutions available.The paper concludes with a future roadmap by discussing some open research issues and future directions.
基金supported by Key Program of Natural Science Foundation of China(Grant No.61631018)Anhui Provincial Natural Science Foundation(Grant No.1908085MF177)Huawei Technology Innovative Research(YBN2018095087)。
文摘The 5 th generation(5 G)mobile networks has been put into services across a number of markets,which aims at providing subscribers with high bit rates,low latency,high capacity,many new services and vertical applications.Therefore the research and development on 6 G have been put on the agenda.Regarding demands and characteristics of future 6 G,artificial intelligence(A),big data(B)and cloud computing(C)will play indispensable roles in achieving the highest efficiency and the largest benefits.Interestingly,the initials of these three aspects remind us the significance of vitamin ABC to human body.In this article we specifically expound on the three elements of ABC and relationships in between.We analyze the basic characteristics of wireless big data(WBD)and the corresponding technical action in A and C,which are the high dimensional feature and spatial separation,the predictive ability,and the characteristics of knowledge.Based on the abilities of WBD,a new learning approach for wireless AI called knowledge+data-driven deep learning(KD-DL)method,and a layered computing architecture of mobile network integrating cloud/edge/terminal computing,is proposed,and their achievable efficiency is discussed.These progress will be conducive to the development of future 6 G.
基金The research leading to these results has received funding from The Research Council(TRC)of the Sultanate of Oman under the Block Funding Program with Agreement No.TRC/BFP/ASU/01/2019.
文摘Mobile broadband(MBB)networks are expanding rapidly to deliver higher data speeds.The fifth-generation cellular network promises enhanced-MBB with high-speed data rates,low power connectivity,and ultralow latency video streaming.However,existing cellular networks are unable to perform well due to high latency and low bandwidth,which degrades the performance of various applications.As a result,monitoring and evaluation of the performance of these network-supported services is critical.Mobile network providers optimize and monitor their network performance to ensure the highest quality of service to their end-users.This paper proposes a Bayesian model to estimate the minimum opinion score(MOS)of video streaming services for any particular cellular network.The MOS is the most commonly used metric to assess the quality of experience.The proposed Bayesian model consists of several input data,namely,round-trip time,stalling load,and bite rates.It was examined and evaluated using several test data sizes with various performance metrics.Simulation results show the proposed Bayesian network achieved higher accuracy overall test data sizes than a neural network.The proposed Bayesian network obtained a remarkable overall accuracy of 90.36%and outperformed the neural network.
文摘In the paper, we illustrate the importance of the concept of mobile network computer from a technological perspective. Because of the usefulness of mobile network computers, with the growth of the Internet of things, mobile network computers may include not only TV box audio-visual equipment, wireless household appliances, and mobile communication equipment, but may also include devices such as intelligent foot rings, smart watches, smart glasses, smart shoes and smart coats. Considering the different types of networks, e.g. IP multimedia Subsystem(IMS), we explain why some network elements are inaccurate and misleading from a technological perspective. We aim to popularize the concept of mobile network computers for its accuracy and importance, which better define modern mobile terminals and reflects the nature of multiple mobile terminals based on the structure of their integrated computers and the capabilities of processing multimedia. In the computer and Internet age, network computers and mobile network computers are the main terminals of fixed and mobile networks, respectively. Therefore, based on the concept of mobile network computers, we discuss the future of information society.
基金the National High Technology Research and Development Program of China (2007AA01Z43)
文摘Protocols for authentication and key establishment have special requirements in a wireless environment. This paper presents a new key agreement protocol HAKA (home server aided key agreement) for roaming scenario. It is carried out by a mobile user and a foreign server with the aid of a home server, which provides all necessary authentications of the three parties. The session key can be obtained by no one except for the mobile user and the foreign server. HAKA is based on Diffie-Hellman key exchange and a secure hash function without using any asymmetric encryption. The protocol is proved secure in Canetti-Krawczyk (CK) model.
基金supported by the 863 project (Grant No. 2014AA01A701) Beijing Natural Science Foundation (Grant No. 4152047)
文摘Hypertext transfer protocol(HTTP) adaptive streaming(HAS) plays a key role in mobile video transmission. Considering the multi-segment and multi-rate features of HAS, this paper proposes a buffer-driven resource management(BDRM) method to enhance HAS quality of experience(QoE) in mobile network. Different from the traditional methods only focusing on base station side without considering the buffer, the proposed method takes both station and client sides into account and end user's buffer plays as the drive of whole schedule process. The proposed HAS QoE influencing factors are composed of initial delay, rebuffering and quality level. The BDRM method decomposes the HAS QoE maximization problem into client and base station sides separately to solve it in multicell and multi-user video playing scene in mobile network. In client side, the decision is made based on buffer probe and rate request algorithm by each user separately. It guarantees the less rebuffering events and decides which HAS segment rate to fetch. While, in the base station side, the schedule of wireless resource is made to maximize the quality level of all access clients and decides the final rate pulled from HAS server. The drive of buffer and twice rate request schemes make BDRMtake full advantage of HAS's multi-segment and multi-rate features. As to the simulation results, compared with proportional fair(PF), Max C/I and traditional HAS schedule(THS) methods, the proposed BDRM method decreases rebuffering percent to 1.96% from 11.1% with PF and from 7.01% with THS and increases the mean MOS of all users to 3.94 from 3.42 with PF method and from 2.15 with Max C/I method. It also guarantees a high fairness with 0.98 from the view of objective and subjective assessment metrics.
文摘The rapid growth of 3G/4G enabled devices such as smartphones and tablets in large numbers has created increased demand for mobile data services. Wi-Fi offloading helps satisfy the requirements of data-rich applications and terminals with improved multi- media. Wi-Fi is an essential approach to alleviating mobile data traffic load on a cellular network because it provides extra capacity and improves overall performance. In this paper, we propose an integrated LTE/Wi-Fi architecture with software-defined networking (SDN) abstraction in mobile baekhaul and enhanced components that facilitate the move towards next-generation 5G mo- bile networks. Our proposed architecture enables programmable offloading policies that take into account real-time network conditions as well as the status of devices and applications. This mechanism improves overall network performance by deriving real- time policies and steering traffic between cellular and Wi-Fi networks more efficiently.
文摘A new approximation of fair queuing called Compensating Hound Robin (CRR) is presented in this paper. The algorithm uses packet-by-packet scheduler with a compensating measure. It achieves good fairness in terms of throughput, requires only O( I) time complexity to process a packet, and is simple enough to be implemented in hardware. After the performances are analyzed, the fairness and packet loss rate of the algorithm are simulated. Simulation results show that the CRR can effectively isolate the effects of contending .sources.
基金Initial Research Foundation of Shanghai Second Polytechnic University ( No.001943)National High Technology Research and Development Program of China(863 Program) (No.2007AA01Z309)
文摘With the increasing popularity of wireless sensor network and GPS ( global positioning system), uncertain data as a new type of data brings a new challenge for the traditional data processing methods. Data broadcast is an effective means for data dissemination in mobile networks. In this paper, the def'mition of the mean uncertainty ratio of data is presented and a broadcasting scheme is proposed for uncertain data dissemination. Simulation results show that the scheme can reduce the uncertainty of the broadcasted uncertain data effectively at the cost of a minor increase in data access time, in the case of no transmission error and presence of transmission errors. As a result, lower uncertainty of data benefits the qualifies of the query results based on the data.
文摘The Intermittently Connected Mobile Networks (ICMN) is a disconnected mobile network where a complete connectivity never exists. More number of moving nodes makes them impenetrable genre which in turn makes the network intermittently connected. Detection of malicious node and routing is onerous due to its genre. In this paper, we put forward a secure routing that aids in detecting and preventing intrusion of malicious nodes. The routing process is made more adorable through Bee Colony Optimization (BCO). The amalgamation of BCO with authentication series leads a novel routing protocol named Privacy Preserving Bee Routing Protocol (PPBRP) which is highly secure. The degree of security is tested with malicious nodes in the network to prove that the proposed PPBRP ensures secure routing.
文摘The Vertical Handover(VHO)is one of the most vital features provided for the heterogeneous mobile networks.It allows Mobile Users(MUs)to keep ongoing sessions without disruption while they continuously move between different Radio Access Technologies(RATs)such as Wireless Fidelity(Wi-Fi),Global System for Mobile Communication(GSM),Universal Mobile Telecommunications System(UMTS),Long Term Evolution(LTE)and Fifth Generation(5G).In order to fulfill this goal,the VHO must comply to three main phases:starting of collecting the required information and then passing it for decision phase to obtain the best available RAT for performing VHO by execution phase eventually.However,the execution phase still encounters some security issues which are exploited by hackers in launching malicious attacks such as ransomware,fragmentation,header manipulation,smurf,host initialization,reconnaissance,eavesdropping,Denial of Service(DoS),spoofing,Man in the Middle(MITM)and falsification.This paper thoroughly studies the recent security issues for hundreds VHO approaches found in the literature and comes up with a secure procedure to enhance VHO security during execution phase.A numerical analysis results of the proposed procedure are effectively evaluated in terms of security and signaling cost.Compared with the recent related work found in literature,the analysis demonstrates that the security is successfully improved by 20%whereas signaling cost is maintained as in non-proposed procedure.
基金This work was supported in part by the National Natural Science Foundation of China under Grants 62002104 and 61872416the Natural Science Foundation of Hubei Province of China under Grant 2019CFB191the special fund for Wuhan Yellow Crane Talents(Excellent Young Scholar).
文摘Over the past years,the emergence of intelligent networks empowered by machine learning techniques has brought great facilitates to different aspects of human life.However,using machine learning in intelligent networks also presents potential security and privacy threats.A common practice is the so-called poisoning attacks where malicious users inject fake training data with the aim of corrupting the learned model.In this survey,we comprehensively review existing poisoning attacks as well as the countermeasures in intelligent networks for the first time.We emphasize and compare the principles of the formal poisoning attacks employed in different categories of learning algorithms,and analyze the strengths and limitations of corresponding defense methods in a compact form.We also highlight some remaining challenges and future directions in the attack-defense confrontation to promote further research in this emerging yet promising area.
基金This work was supported by the Taif University Researchers Supporting Project number(TURSP-2020/79),Taif University,Taif,Saudi Arabia.
文摘There has been an exponential rise in mobile data traffic in recent times due to the increasing popularity of portable devices like tablets,smartphones,and laptops.The rapid rise in the use of these portable devices has put extreme stress on the network service providers while forcing telecommunication engineers to look for innovative solutions to meet the increased demand.One solution to the problem is the emergence of fifth-generation(5G)wireless communication,which can address the challenges by offering very broad wireless area capacity and potential cut-power consumption.The application of small cells is the fundamental mechanism for the 5Gtechnology.The use of small cells can enhance the facility for higher capacity and reuse.However,it must be noted that small cells deployment will lead to frequent handovers of mobile nodes.Considering the importance of small cells in 5G,this paper aims to examine a new resource management scheme that can work to minimize the rate of handovers formobile phones through careful resources allocation in a two-tier network.Therefore,the resource management problem has been formulated as an optimization issue thatwe aim to overcome through an optimal solution.To find a solution to the existing problem of frequent handovers,a heuristic approach has been used.This solution is then evaluated and validated through simulation and testing,during which the performance was noted to improve by 12%in the context of handover costs.Therefore,this model has been observed to be more efficient as compared to the existing model.
基金This work was supported by Institute of Information&communications Technology Planning&Evaluation(IITP)grant funded by the Korea government(MSIT)[No.2021-0-0268,Artificial Intelligence Innovation Hub(Artificial Intelligence Institute,Seoul National University)]。
文摘Acoustic scene classification(ASC)is a method of recognizing and classifying environments that employ acoustic signals.Various ASC approaches based on deep learning have been developed,with convolutional neural networks(CNNs)proving to be the most reliable and commonly utilized in ASC systems due to their suitability for constructing lightweight models.When using ASC systems in the real world,model complexity and device robustness are essential considerations.In this paper,we propose a two-pass mobile network for low-complexity classification of the acoustic scene,named TP-MobNet.With inverse residuals and linear bottlenecks,TPMobNet is based on MobileNetV2,and following mobile blocks,coordinate attention and two-pass fusion approaches are utilized.The log-range dependencies and precise position information in feature maps can be trained via coordinate attention.By capturing more diverse feature resolutions at the network’s end sides,two-pass fusions can also train generalization.Also,the model size is reduced by applying weight quantization to the trained model.By adding weight quantization to the trained model,the model size is also lowered.The TAU Urban Acoustic Scenes 2020 Mobile development set was used for all of the experiments.It has been confirmed that the proposed model,with a model size of 219.6 kB,achieves an accuracy of 73.94%.
文摘Over-the-top services and cloud services have created great challenges for telecom operators. To better meet the requirements of cloud services, we propose a decoupled network architecture. Software-defined networking/network function virtualization (SDN/ NFV) will be vital in the construction of cloud-oriented broadband infrastructure, especially within data centers and for intercon nection between data centers. We also propose introducing SDN/NFV in the broadband access network in order to realize a virtu- alized residential gateway (VRG). We discuss the deployment modes of VRG.