A large number of Web APIs have been released as services in mobile communications,but the service provided by a single Web API is usually limited.To enrich the services in mobile communications,developers have combin...A large number of Web APIs have been released as services in mobile communications,but the service provided by a single Web API is usually limited.To enrich the services in mobile communications,developers have combined Web APIs and developed a new service,which is known as a mashup.The emergence of mashups greatly increases the number of services in mobile communications,especially in mobile networks and the Internet-of-Things(IoT),and has encouraged companies and individuals to develop even more mashups,which has led to the dramatic increase in the number of mashups.Such a trend brings with it big data,such as the massive text data from the mashups themselves and continually-generated usage data.Thus,the question of how to determine the most suitable mashups from big data has become a challenging problem.In this paper,we propose a mashup recommendation framework from big data in mobile networks and the IoT.The proposed framework is driven by machine learning techniques,including neural embedding,clustering,and matrix factorization.We employ neural embedding to learn the distributed representation of mashups and propose to use cluster analysis to learn the relationship among the mashups.We also develop a novel Joint Matrix Factorization(JMF)model to complete the mashup recommendation task,where we design a new objective function and an optimization algorithm.We then crawl through a real-world large mashup dataset and perform experiments.The experimental results demonstrate that our framework achieves high accuracy in mashup recommendation and performs better than all compared baselines.展开更多
In the paper, we illustrate the importance of the concept of mobile network computer from a technological perspective. Because of the usefulness of mobile network computers, with the growth of the Internet of things, ...In the paper, we illustrate the importance of the concept of mobile network computer from a technological perspective. Because of the usefulness of mobile network computers, with the growth of the Internet of things, mobile network computers may include not only TV box audio-visual equipment, wireless household appliances, and mobile communication equipment, but may also include devices such as intelligent foot rings, smart watches, smart glasses, smart shoes and smart coats. Considering the different types of networks, e.g. IP multimedia Subsystem(IMS), we explain why some network elements are inaccurate and misleading from a technological perspective. We aim to popularize the concept of mobile network computers for its accuracy and importance, which better define modern mobile terminals and reflects the nature of multiple mobile terminals based on the structure of their integrated computers and the capabilities of processing multimedia. In the computer and Internet age, network computers and mobile network computers are the main terminals of fixed and mobile networks, respectively. Therefore, based on the concept of mobile network computers, we discuss the future of information society.展开更多
The Intermittently Connected Mobile Networks (ICMN) is a disconnected mobile network where a complete connectivity never exists. More number of moving nodes makes them impenetrable genre which in turn makes the n...The Intermittently Connected Mobile Networks (ICMN) is a disconnected mobile network where a complete connectivity never exists. More number of moving nodes makes them impenetrable genre which in turn makes the network intermittently connected. Detection of malicious node and routing is onerous due to its genre. In this paper, we put forward a secure routing that aids in detecting and preventing intrusion of malicious nodes. The routing process is made more adorable through Bee Colony Optimization (BCO). The amalgamation of BCO with authentication series leads a novel routing protocol named Privacy Preserving Bee Routing Protocol (PPBRP) which is highly secure. The degree of security is tested with malicious nodes in the network to prove that the proposed PPBRP ensures secure routing.展开更多
There has been an exponential rise in mobile data traffic in recent times due to the increasing popularity of portable devices like tablets,smartphones,and laptops.The rapid rise in the use of these portable devices h...There has been an exponential rise in mobile data traffic in recent times due to the increasing popularity of portable devices like tablets,smartphones,and laptops.The rapid rise in the use of these portable devices has put extreme stress on the network service providers while forcing telecommunication engineers to look for innovative solutions to meet the increased demand.One solution to the problem is the emergence of fifth-generation(5G)wireless communication,which can address the challenges by offering very broad wireless area capacity and potential cut-power consumption.The application of small cells is the fundamental mechanism for the 5Gtechnology.The use of small cells can enhance the facility for higher capacity and reuse.However,it must be noted that small cells deployment will lead to frequent handovers of mobile nodes.Considering the importance of small cells in 5G,this paper aims to examine a new resource management scheme that can work to minimize the rate of handovers formobile phones through careful resources allocation in a two-tier network.Therefore,the resource management problem has been formulated as an optimization issue thatwe aim to overcome through an optimal solution.To find a solution to the existing problem of frequent handovers,a heuristic approach has been used.This solution is then evaluated and validated through simulation and testing,during which the performance was noted to improve by 12%in the context of handover costs.Therefore,this model has been observed to be more efficient as compared to the existing model.展开更多
Recently,the fifth generation(5G)of mobile networks has been deployed and various ranges of mobile services have been provided.The 5G mobile network supports improved mobile broadband,ultra-low latency and densely dep...Recently,the fifth generation(5G)of mobile networks has been deployed and various ranges of mobile services have been provided.The 5G mobile network supports improved mobile broadband,ultra-low latency and densely deployed massive devices.It allows multiple radio access technologies and interworks them for services.5G mobile systems employ traffic steering techniques to efficiently use multiple radio access technologies.However,conventional traffic steering techniques do not consider dynamic network conditions efficiently.In this paper,we propose a network aided traffic steering technique in 5G mobile network architecture.5G mobile systems monitor network conditions and learn with network data.Through a machine learning algorithm such as a feed-forward neural network,it recognizes dynamic network conditions and then performs traffic steering.The proposed scheme controls traffic for multiple radio access according to the ratio of measured throughput.Thus,it can be expected to improve traffic steering efficiency.The performance of the proposed traffic steering scheme is evaluated using extensive computer simulations.展开更多
Acoustic scene classification(ASC)is a method of recognizing and classifying environments that employ acoustic signals.Various ASC approaches based on deep learning have been developed,with convolutional neural networ...Acoustic scene classification(ASC)is a method of recognizing and classifying environments that employ acoustic signals.Various ASC approaches based on deep learning have been developed,with convolutional neural networks(CNNs)proving to be the most reliable and commonly utilized in ASC systems due to their suitability for constructing lightweight models.When using ASC systems in the real world,model complexity and device robustness are essential considerations.In this paper,we propose a two-pass mobile network for low-complexity classification of the acoustic scene,named TP-MobNet.With inverse residuals and linear bottlenecks,TPMobNet is based on MobileNetV2,and following mobile blocks,coordinate attention and two-pass fusion approaches are utilized.The log-range dependencies and precise position information in feature maps can be trained via coordinate attention.By capturing more diverse feature resolutions at the network’s end sides,two-pass fusions can also train generalization.Also,the model size is reduced by applying weight quantization to the trained model.By adding weight quantization to the trained model,the model size is also lowered.The TAU Urban Acoustic Scenes 2020 Mobile development set was used for all of the experiments.It has been confirmed that the proposed model,with a model size of 219.6 kB,achieves an accuracy of 73.94%.展开更多
The Vertical Handover(VHO)is one of the most vital features provided for the heterogeneous mobile networks.It allows Mobile Users(MUs)to keep ongoing sessions without disruption while they continuously move between di...The Vertical Handover(VHO)is one of the most vital features provided for the heterogeneous mobile networks.It allows Mobile Users(MUs)to keep ongoing sessions without disruption while they continuously move between different Radio Access Technologies(RATs)such as Wireless Fidelity(Wi-Fi),Global System for Mobile Communication(GSM),Universal Mobile Telecommunications System(UMTS),Long Term Evolution(LTE)and Fifth Generation(5G).In order to fulfill this goal,the VHO must comply to three main phases:starting of collecting the required information and then passing it for decision phase to obtain the best available RAT for performing VHO by execution phase eventually.However,the execution phase still encounters some security issues which are exploited by hackers in launching malicious attacks such as ransomware,fragmentation,header manipulation,smurf,host initialization,reconnaissance,eavesdropping,Denial of Service(DoS),spoofing,Man in the Middle(MITM)and falsification.This paper thoroughly studies the recent security issues for hundreds VHO approaches found in the literature and comes up with a secure procedure to enhance VHO security during execution phase.A numerical analysis results of the proposed procedure are effectively evaluated in terms of security and signaling cost.Compared with the recent related work found in literature,the analysis demonstrates that the security is successfully improved by 20%whereas signaling cost is maintained as in non-proposed procedure.展开更多
Blockchain can mean many things to many people.It is a set of protocols and encryption technologies for securely storing data on a distributed network for the developers.It is a distributed ledger for business and fin...Blockchain can mean many things to many people.It is a set of protocols and encryption technologies for securely storing data on a distributed network for the developers.It is a distributed ledger for business and finance and the technology underlying the explosion of new digital currencies.For technologists,it is the driving force behind the next generation of the internet.On the other hand,it is a transformational technology facilitating large-scale human progress in previously unimagined ways for the rest of the people,a tool for radically reshaping society and economy.Some view it as a disruptive technology that can be the source of a great deal of fraud,illegal activity,where others see opportunities to bring into existing systems by providing decentralization,transparency,and efficiency.This complex technological,economic,and social phenomenon has been the subject of fervent debate.It calls into question what might have been seen to be established parameters of the modern world like currency,economics,trust,value,and exchange.It is a revolutionary new computing paradigm and one of the most significant,fundamental digital platforms’advances since the internet.It is an emergent technology experiencing very rapid evolution,and so is our understanding of what it is and what it can be.This paper is subject to the use of Blockchain concepts in mobile networks to strengthen the Home Location Registry(HLR)database and make it decentralized for secure transactions and in banking and financial centers.Blockchain also holds potential implications for global commerce.It could make trade more efficient by removing the manual and paper-based processes and introducing streamlined and automated processes.展开更多
Call Detailed Records(CDR)are generated and stored in Mobile Networks(MNs)and contain subscriber’s information about active or passive usage of the network for various communication activities.The spatio-temporal nat...Call Detailed Records(CDR)are generated and stored in Mobile Networks(MNs)and contain subscriber’s information about active or passive usage of the network for various communication activities.The spatio-temporal nature of CDR makes them a valuable dataset used for forensic activities.Advances in technology have led to the seamless communication across Multiple Mobile Network(MMN),which poses a threat to the availability and integrity of CDR data.Present CDR implementation is capable of logging peer-to-peer communications over single connection only,thus necessitating improvements on how the CDR data is stored for forensic analysis.In this paper,the problem is solved by identifying and conceptually modelling six new artifacts generated by such communication activities.The newly identified artifacts are introduced into the existing CDR for an incident capturing of the required data for forensic analysis during investigations involved in the MMN communication.Results show an improved absolute speed of 0.0058 s for the MMN-CDR to associate a suspect with an incident,which is 0.0038 s faster than the speed of 0.0097s for the existing CDR to associate a suspect with an accomplice.Thus,a novel method for forensically tracking calls over the MMN has been developed.The MMN-CDR,when forensically analyzed,reveals an increase in time efficiency over the existing CDR due to its high absolute speed.Also,higher accuracy and completeness percentage are both obtained.展开更多
Mobile Net V2算法在深度可分离卷积网络的基础上结合了残差网络结构,在降低计算量的基础上提升模型的精度。为进一步提升精度,受密集连接和深度可分离卷积的启发,在Mobile Net V2的基础上结合一种快速的密集多尺度特征融合的结构,提取...Mobile Net V2算法在深度可分离卷积网络的基础上结合了残差网络结构,在降低计算量的基础上提升模型的精度。为进一步提升精度,受密集连接和深度可分离卷积的启发,在Mobile Net V2的基础上结合一种快速的密集多尺度特征融合的结构,提取浅层通道与空间特征与深度特征信息融合。实验表明,多尺度特征密集连接融合的Mobile Net V2(Multi-Feature Densely Fusion Mobile Net V2,MFDF Mobile Net V2)算法,在微量增加运算量的情况下,在Caltech-101数据集和Cifar10数据集上的表现都有提升,具备一定的实用性。展开更多
垃圾分类有利于资源的回收利用和减少环境污染。文章结合计算机视觉与垃圾分类任务,提出一种针对改进的Mobile Net V2生活垃圾图像分类算法。与原有的分类算法相比,改进的Mobile NetV2算法引入注意力机制引导模型关注图像的关键信息特征...垃圾分类有利于资源的回收利用和减少环境污染。文章结合计算机视觉与垃圾分类任务,提出一种针对改进的Mobile Net V2生活垃圾图像分类算法。与原有的分类算法相比,改进的Mobile NetV2算法引入注意力机制引导模型关注图像的关键信息特征,提高模型特征表达的能力。此外,通过构建垃圾分类的数据集便于模型训练和测试,并提出一种类内随机图像融合的数据噪声增强策略,进一步增加数据的多样性。实验显示,改进的注意力Mobile Net V2网络进一步提升了网络的分类准确率,具备一定的实用性。展开更多
This paper applies the perspective of business ecosystem to mobile communications industry,trying to help mobile network operators improve their strategies in the era of the third generation mobile communications(3G)....This paper applies the perspective of business ecosystem to mobile communications industry,trying to help mobile network operators improve their strategies in the era of the third generation mobile communications(3G).According to the definition of the business ecosystem,the ecosystem structure of mobile network operators is analyzed.As an important hub in the ecosystem,mobile network operators are advised to take a keystone strategy.The key points of the strategy are summarized.Finally,suggestions for Chinese mobile network operators are given based on the analysis.展开更多
This paper presented a joint resource allocation(RA) and admission control(AC) mechanism in software defined mobile networks(SDMNs). In this mechanism, the joint RA and AC problem can be formulated as an optimization ...This paper presented a joint resource allocation(RA) and admission control(AC) mechanism in software defined mobile networks(SDMNs). In this mechanism, the joint RA and AC problem can be formulated as an optimization problem with the aim of maximizing the number of admitted users while simultaneously minimizing the number of allocated channels. Since the primal problem is modeled to be a mixed integer nonlinear problem(MINLP), we attain the suboptimal solutions to the primal MINLP by convex relaxation. Additionally, with the global information collected by the SDMNs controller, a centralized joint RA and AC(CJRA)algorithm is proposed by the Lagrange dual decomposition technique to obtain the global optimum. Meanwhile, we propose an OpenFlow rules placement strategy to realize CJRA in an efficient way. Moreover, a distributed algorithm is also developed to find the local optimum, showing a performance benchmark for the centralized one. Finally, simulation results show that the proposed centralized algorithm admits more users compared with the distributed.展开更多
Synchronization is a process that describes the coherent dynamics of a large ensemble of interacting units.The study of explosive synchronization transition attracts considerable attention.Here,I report the explosive ...Synchronization is a process that describes the coherent dynamics of a large ensemble of interacting units.The study of explosive synchronization transition attracts considerable attention.Here,I report the explosive transition within the framework of a mobile network,while each oscillator is controlled by global-order parameters of the system.Using numerical simulation,I find that the explosive synchronization(ES)transition behavior can be controlled by simply adjusting the fraction of controlled oscillators.The influences of some parameters on explosive synchronization are studied.Moreover,due to the presence of the positive feedback mechanism,I prevent the occurrence of the synchronization of continuous-phase transition and make phase transition of the system a first-order phase transition accompanied by a hysteresis loop.展开更多
Modern society has been widely benefiting from the advances in wireless technology. During the past decade, extensive research efforts have been dedicated to develop the fifth-generation (5G) wireless mobile networks....Modern society has been widely benefiting from the advances in wireless technology. During the past decade, extensive research efforts have been dedicated to develop the fifth-generation (5G) wireless mobile networks. This resulted in enabling technologies for the three generic connectivity types in 5G (broadband, massive Internet-of-things connectivity and ultra-reliable low latency communication) as well as their coexistence.展开更多
In this paper,the performance of a mobile wireless communication network operating over the Fisher-Snedecor J composite fading channel is analyzed.Specifically,a multi-antenna base station transmits information to a s...In this paper,the performance of a mobile wireless communication network operating over the Fisher-Snedecor J composite fading channel is analyzed.Specifically,a multi-antenna base station transmits information to a single-antenna mobile receiver,which employs the maximal-ratio transmission technique to improve the quality of the received signal.The well-known random waypoint mobility model is assumed to characterize the mobility of the receiver.Under this mobility scenario,we derive exact closed-form expressions for the probability density function,cumulative distribution function,and consequently for the Outage Probability(OP),the average Bit Error Rate(BER)for different digital modulation schemes,and the average channel capacity.To shed light into the impact of different channel parameters,simple asymptotic expressions at the high SNR regime are obtained for the OP and average BER.To validate our analytical expressions,the comprehensive Monte-Carlo simulations are conducted under various configurations and both results are in excellent agreement.展开更多
In the current mobile IPv6 (MIPv6) systems for the System architecture evaluation (SAE) networks, such as 4th generation (4G) mobile network, the data delivery is performed basing on a centralized mobility network anc...In the current mobile IPv6 (MIPv6) systems for the System architecture evaluation (SAE) networks, such as 4th generation (4G) mobile network, the data delivery is performed basing on a centralized mobility network anchor between Evolved Node B (eNB) and Serving Gateways (S-GW), and also between S-GW and Packet Data Network Gateway (P-GW). However, the existing network has many obstacles, including suboptimal data routing, injection of unwanted data traffic into mobile core network and the requirement of capital expenditure. To handle these challenges, here we describe a flat mobile core network scheme donated by F-EPC, based SAE mobile network. In the proposed scheme, the P-GW and S-GW gateways are features as one node named Cellular Gateway (C-GW). Further, we proposed to distribute and increase the number of C-GW in mobile core network, the Mobility Management Entity (MME) functioned as centralizing mobility anchor and allocating the IP address for the User Entity (UE). In this paper, the explained results of a simulation analysis showed that the proposed scheme provides a superior performance compared with the current 4G architecture in terms of total transmission delay, handover delay and initial attach procedure.展开更多
In recent years, we need more bandwidth to enjoy entertainment contents such as video streaming, music and online gaming. To gain enough bandwidth, technologies that combine bandwidth by using multiple interfaces at s...In recent years, we need more bandwidth to enjoy entertainment contents such as video streaming, music and online gaming. To gain enough bandwidth, technologies that combine bandwidth by using multiple interfaces at same time are desired. Multipath transport protocols which combine multiple paths for packet delivery at the transport layer are a promising technology. Such protocols have a mechanism, called “packet scheduler”, to select the interface to send a packet. However, existing studies of the packet scheduler have not explicitly considered the compatibility of mobility with bonding of bandwidth. Therefore, when smartphone users move out of coverage of communication networks such as wireless Local Area Network (LAN) and Long Term Evolution (LTE) by vehicle, packet loss occurs, leading to a decrease of throughput. In this study, we propose a packet scheduler that selects an appropriate communication path so that packets can reach the peer before it moves out of the coverage. Based on routes of a vehicle and the position and communication range of the access point, the time at which a communication path will be lost is predicted. In addition, we employ MPQUIC (Multipath QUIC (Quick UDP Internet Connections)), which is a multipath transport protocol proposed as the extension of QUIC protocol, to reduce the ACK packet loss in multipath communication, and to reduce the time until the starts of retransmission. We evaluated the number of packet losses, the throughput and the time until starts of retransmission using a simulator and show the superiority of proposed method.展开更多
We develop a policy of observer-based dynamic event-triggered state feedback control for distributed parameter systems over a mobile sensor-plus-actuator network.It is assumed that the mobile sensing devices that prov...We develop a policy of observer-based dynamic event-triggered state feedback control for distributed parameter systems over a mobile sensor-plus-actuator network.It is assumed that the mobile sensing devices that provide spatially averaged state measurements can be used to improve state estimation in the network.For the purpose of decreasing the update frequency of controller and unnecessary sampled data transmission, an efficient dynamic event-triggered control policy is constructed.In an event-triggered system, when an error signal exceeds a specified time-varying threshold, it indicates the occurrence of a typical event.The global asymptotic stability of the event-triggered closed-loop system and the boundedness of the minimum inter-event time can be guaranteed.Based on the linear quadratic optimal regulator, the actuator selects the optimal displacement only when an event occurs.A simulation example is finally used to verify that the effectiveness of such a control strategy can enhance the system performance.展开更多
Multidrug-resistant(MDR)Enterobacteriaceae critically threaten duck farming and public health.The phenotypes,genotypes,and associated mobile genetic elements(MGEs)of MDR Enterobacteriaceae isolated from 6 duck farms i...Multidrug-resistant(MDR)Enterobacteriaceae critically threaten duck farming and public health.The phenotypes,genotypes,and associated mobile genetic elements(MGEs)of MDR Enterobacteriaceae isolated from 6 duck farms in Zhejiang Province,China,were investigated.A total of 215 isolates were identified as Escherichia coli(64.65%),Klebsiella pneumoniae(12.09%),Proteus mirabilis(10.23%),Salmonella(8.84%),and Enterobacter cloacae(4.19%).Meanwhile,all isolates were resistant to at least two antibiotics.Most isolates carried tet(A)(85.12%),blaTEM(78.60%)and sul1(67.44%)resistance genes.Gene co-occurrence analysis showed that the resistance genes were associated with IS26 and integrons.A conjugative IncFII plasmid pSDM004 containing all the above MGEs was detected in Proteus mirabilis isolate SDM004.This isolate was resistant to 18 antibiotics and carried the blaNDM-5 gene.MGEs,especially plasmids,are the primary antibiotic resistance gene transmission route in duck farms.These findings provide a theoretical basis for the rational use of antibiotics in farms which are substantial for evaluating public health and food safety.展开更多
基金supported by the National Key R&D Program of China (No.2021YFF0901002)the National Natural Science Foundation of China (No.61802291)+1 种基金Fundamental Research Funds for the Provincial Universities of Zhejiang (GK199900299012-025)Fundamental Research Funds for the Central Universities (No.JB210311).
文摘A large number of Web APIs have been released as services in mobile communications,but the service provided by a single Web API is usually limited.To enrich the services in mobile communications,developers have combined Web APIs and developed a new service,which is known as a mashup.The emergence of mashups greatly increases the number of services in mobile communications,especially in mobile networks and the Internet-of-Things(IoT),and has encouraged companies and individuals to develop even more mashups,which has led to the dramatic increase in the number of mashups.Such a trend brings with it big data,such as the massive text data from the mashups themselves and continually-generated usage data.Thus,the question of how to determine the most suitable mashups from big data has become a challenging problem.In this paper,we propose a mashup recommendation framework from big data in mobile networks and the IoT.The proposed framework is driven by machine learning techniques,including neural embedding,clustering,and matrix factorization.We employ neural embedding to learn the distributed representation of mashups and propose to use cluster analysis to learn the relationship among the mashups.We also develop a novel Joint Matrix Factorization(JMF)model to complete the mashup recommendation task,where we design a new objective function and an optimization algorithm.We then crawl through a real-world large mashup dataset and perform experiments.The experimental results demonstrate that our framework achieves high accuracy in mashup recommendation and performs better than all compared baselines.
文摘In the paper, we illustrate the importance of the concept of mobile network computer from a technological perspective. Because of the usefulness of mobile network computers, with the growth of the Internet of things, mobile network computers may include not only TV box audio-visual equipment, wireless household appliances, and mobile communication equipment, but may also include devices such as intelligent foot rings, smart watches, smart glasses, smart shoes and smart coats. Considering the different types of networks, e.g. IP multimedia Subsystem(IMS), we explain why some network elements are inaccurate and misleading from a technological perspective. We aim to popularize the concept of mobile network computers for its accuracy and importance, which better define modern mobile terminals and reflects the nature of multiple mobile terminals based on the structure of their integrated computers and the capabilities of processing multimedia. In the computer and Internet age, network computers and mobile network computers are the main terminals of fixed and mobile networks, respectively. Therefore, based on the concept of mobile network computers, we discuss the future of information society.
文摘The Intermittently Connected Mobile Networks (ICMN) is a disconnected mobile network where a complete connectivity never exists. More number of moving nodes makes them impenetrable genre which in turn makes the network intermittently connected. Detection of malicious node and routing is onerous due to its genre. In this paper, we put forward a secure routing that aids in detecting and preventing intrusion of malicious nodes. The routing process is made more adorable through Bee Colony Optimization (BCO). The amalgamation of BCO with authentication series leads a novel routing protocol named Privacy Preserving Bee Routing Protocol (PPBRP) which is highly secure. The degree of security is tested with malicious nodes in the network to prove that the proposed PPBRP ensures secure routing.
基金This work was supported by the Taif University Researchers Supporting Project number(TURSP-2020/79),Taif University,Taif,Saudi Arabia.
文摘There has been an exponential rise in mobile data traffic in recent times due to the increasing popularity of portable devices like tablets,smartphones,and laptops.The rapid rise in the use of these portable devices has put extreme stress on the network service providers while forcing telecommunication engineers to look for innovative solutions to meet the increased demand.One solution to the problem is the emergence of fifth-generation(5G)wireless communication,which can address the challenges by offering very broad wireless area capacity and potential cut-power consumption.The application of small cells is the fundamental mechanism for the 5Gtechnology.The use of small cells can enhance the facility for higher capacity and reuse.However,it must be noted that small cells deployment will lead to frequent handovers of mobile nodes.Considering the importance of small cells in 5G,this paper aims to examine a new resource management scheme that can work to minimize the rate of handovers formobile phones through careful resources allocation in a two-tier network.Therefore,the resource management problem has been formulated as an optimization issue thatwe aim to overcome through an optimal solution.To find a solution to the existing problem of frequent handovers,a heuristic approach has been used.This solution is then evaluated and validated through simulation and testing,during which the performance was noted to improve by 12%in the context of handover costs.Therefore,this model has been observed to be more efficient as compared to the existing model.
基金This research was supported by the MSIT(Ministry of Science and ICT),Korea,under the ITRC(Information Technology Research Center)support program(IITP-2020-2015-0-00403)supervised by the IITP(Institute for Information&communications Technology Planning&Evaluation)this work was supported by the Soonchunhyang University Research Fund.
文摘Recently,the fifth generation(5G)of mobile networks has been deployed and various ranges of mobile services have been provided.The 5G mobile network supports improved mobile broadband,ultra-low latency and densely deployed massive devices.It allows multiple radio access technologies and interworks them for services.5G mobile systems employ traffic steering techniques to efficiently use multiple radio access technologies.However,conventional traffic steering techniques do not consider dynamic network conditions efficiently.In this paper,we propose a network aided traffic steering technique in 5G mobile network architecture.5G mobile systems monitor network conditions and learn with network data.Through a machine learning algorithm such as a feed-forward neural network,it recognizes dynamic network conditions and then performs traffic steering.The proposed scheme controls traffic for multiple radio access according to the ratio of measured throughput.Thus,it can be expected to improve traffic steering efficiency.The performance of the proposed traffic steering scheme is evaluated using extensive computer simulations.
基金This work was supported by Institute of Information&communications Technology Planning&Evaluation(IITP)grant funded by the Korea government(MSIT)[No.2021-0-0268,Artificial Intelligence Innovation Hub(Artificial Intelligence Institute,Seoul National University)]。
文摘Acoustic scene classification(ASC)is a method of recognizing and classifying environments that employ acoustic signals.Various ASC approaches based on deep learning have been developed,with convolutional neural networks(CNNs)proving to be the most reliable and commonly utilized in ASC systems due to their suitability for constructing lightweight models.When using ASC systems in the real world,model complexity and device robustness are essential considerations.In this paper,we propose a two-pass mobile network for low-complexity classification of the acoustic scene,named TP-MobNet.With inverse residuals and linear bottlenecks,TPMobNet is based on MobileNetV2,and following mobile blocks,coordinate attention and two-pass fusion approaches are utilized.The log-range dependencies and precise position information in feature maps can be trained via coordinate attention.By capturing more diverse feature resolutions at the network’s end sides,two-pass fusions can also train generalization.Also,the model size is reduced by applying weight quantization to the trained model.By adding weight quantization to the trained model,the model size is also lowered.The TAU Urban Acoustic Scenes 2020 Mobile development set was used for all of the experiments.It has been confirmed that the proposed model,with a model size of 219.6 kB,achieves an accuracy of 73.94%.
文摘The Vertical Handover(VHO)is one of the most vital features provided for the heterogeneous mobile networks.It allows Mobile Users(MUs)to keep ongoing sessions without disruption while they continuously move between different Radio Access Technologies(RATs)such as Wireless Fidelity(Wi-Fi),Global System for Mobile Communication(GSM),Universal Mobile Telecommunications System(UMTS),Long Term Evolution(LTE)and Fifth Generation(5G).In order to fulfill this goal,the VHO must comply to three main phases:starting of collecting the required information and then passing it for decision phase to obtain the best available RAT for performing VHO by execution phase eventually.However,the execution phase still encounters some security issues which are exploited by hackers in launching malicious attacks such as ransomware,fragmentation,header manipulation,smurf,host initialization,reconnaissance,eavesdropping,Denial of Service(DoS),spoofing,Man in the Middle(MITM)and falsification.This paper thoroughly studies the recent security issues for hundreds VHO approaches found in the literature and comes up with a secure procedure to enhance VHO security during execution phase.A numerical analysis results of the proposed procedure are effectively evaluated in terms of security and signaling cost.Compared with the recent related work found in literature,the analysis demonstrates that the security is successfully improved by 20%whereas signaling cost is maintained as in non-proposed procedure.
文摘Blockchain can mean many things to many people.It is a set of protocols and encryption technologies for securely storing data on a distributed network for the developers.It is a distributed ledger for business and finance and the technology underlying the explosion of new digital currencies.For technologists,it is the driving force behind the next generation of the internet.On the other hand,it is a transformational technology facilitating large-scale human progress in previously unimagined ways for the rest of the people,a tool for radically reshaping society and economy.Some view it as a disruptive technology that can be the source of a great deal of fraud,illegal activity,where others see opportunities to bring into existing systems by providing decentralization,transparency,and efficiency.This complex technological,economic,and social phenomenon has been the subject of fervent debate.It calls into question what might have been seen to be established parameters of the modern world like currency,economics,trust,value,and exchange.It is a revolutionary new computing paradigm and one of the most significant,fundamental digital platforms’advances since the internet.It is an emergent technology experiencing very rapid evolution,and so is our understanding of what it is and what it can be.This paper is subject to the use of Blockchain concepts in mobile networks to strengthen the Home Location Registry(HLR)database and make it decentralized for secure transactions and in banking and financial centers.Blockchain also holds potential implications for global commerce.It could make trade more efficient by removing the manual and paper-based processes and introducing streamlined and automated processes.
文摘Call Detailed Records(CDR)are generated and stored in Mobile Networks(MNs)and contain subscriber’s information about active or passive usage of the network for various communication activities.The spatio-temporal nature of CDR makes them a valuable dataset used for forensic activities.Advances in technology have led to the seamless communication across Multiple Mobile Network(MMN),which poses a threat to the availability and integrity of CDR data.Present CDR implementation is capable of logging peer-to-peer communications over single connection only,thus necessitating improvements on how the CDR data is stored for forensic analysis.In this paper,the problem is solved by identifying and conceptually modelling six new artifacts generated by such communication activities.The newly identified artifacts are introduced into the existing CDR for an incident capturing of the required data for forensic analysis during investigations involved in the MMN communication.Results show an improved absolute speed of 0.0058 s for the MMN-CDR to associate a suspect with an incident,which is 0.0038 s faster than the speed of 0.0097s for the existing CDR to associate a suspect with an accomplice.Thus,a novel method for forensically tracking calls over the MMN has been developed.The MMN-CDR,when forensically analyzed,reveals an increase in time efficiency over the existing CDR due to its high absolute speed.Also,higher accuracy and completeness percentage are both obtained.
文摘Mobile Net V2算法在深度可分离卷积网络的基础上结合了残差网络结构,在降低计算量的基础上提升模型的精度。为进一步提升精度,受密集连接和深度可分离卷积的启发,在Mobile Net V2的基础上结合一种快速的密集多尺度特征融合的结构,提取浅层通道与空间特征与深度特征信息融合。实验表明,多尺度特征密集连接融合的Mobile Net V2(Multi-Feature Densely Fusion Mobile Net V2,MFDF Mobile Net V2)算法,在微量增加运算量的情况下,在Caltech-101数据集和Cifar10数据集上的表现都有提升,具备一定的实用性。
文摘垃圾分类有利于资源的回收利用和减少环境污染。文章结合计算机视觉与垃圾分类任务,提出一种针对改进的Mobile Net V2生活垃圾图像分类算法。与原有的分类算法相比,改进的Mobile NetV2算法引入注意力机制引导模型关注图像的关键信息特征,提高模型特征表达的能力。此外,通过构建垃圾分类的数据集便于模型训练和测试,并提出一种类内随机图像融合的数据噪声增强策略,进一步增加数据的多样性。实验显示,改进的注意力Mobile Net V2网络进一步提升了网络的分类准确率,具备一定的实用性。
文摘This paper applies the perspective of business ecosystem to mobile communications industry,trying to help mobile network operators improve their strategies in the era of the third generation mobile communications(3G).According to the definition of the business ecosystem,the ecosystem structure of mobile network operators is analyzed.As an important hub in the ecosystem,mobile network operators are advised to take a keystone strategy.The key points of the strategy are summarized.Finally,suggestions for Chinese mobile network operators are given based on the analysis.
基金supported by the National Natural Science Foundation of China under Grant No.61701284,61472229,31671588 and 61801270the China Postdoctoral Science Foundation Funded Project under Grant No2017M622233+2 种基金the Application Research Project for Postdoctoral Researchers of Qingdao,the Scientific Research Foundation of Shandong University of Science and Technology for Recruited Talents under Grant No.2016RCJJ010the Sci.&Tech.DevelopmentFund of Shandong Province of China underGrant No.2016ZDJS02A11,ZR2017BF015and ZR2017MF027the Taishan Scholar Climbing Program of Shandong Province,and SDUST Research Fund under Grant No.2015TDJH102
文摘This paper presented a joint resource allocation(RA) and admission control(AC) mechanism in software defined mobile networks(SDMNs). In this mechanism, the joint RA and AC problem can be formulated as an optimization problem with the aim of maximizing the number of admitted users while simultaneously minimizing the number of allocated channels. Since the primal problem is modeled to be a mixed integer nonlinear problem(MINLP), we attain the suboptimal solutions to the primal MINLP by convex relaxation. Additionally, with the global information collected by the SDMNs controller, a centralized joint RA and AC(CJRA)algorithm is proposed by the Lagrange dual decomposition technique to obtain the global optimum. Meanwhile, we propose an OpenFlow rules placement strategy to realize CJRA in an efficient way. Moreover, a distributed algorithm is also developed to find the local optimum, showing a performance benchmark for the centralized one. Finally, simulation results show that the proposed centralized algorithm admits more users compared with the distributed.
基金the Natural Science Foundation of Jiangsu Province,China(Grant No.20KJB470030).
文摘Synchronization is a process that describes the coherent dynamics of a large ensemble of interacting units.The study of explosive synchronization transition attracts considerable attention.Here,I report the explosive transition within the framework of a mobile network,while each oscillator is controlled by global-order parameters of the system.Using numerical simulation,I find that the explosive synchronization(ES)transition behavior can be controlled by simply adjusting the fraction of controlled oscillators.The influences of some parameters on explosive synchronization are studied.Moreover,due to the presence of the positive feedback mechanism,I prevent the occurrence of the synchronization of continuous-phase transition and make phase transition of the system a first-order phase transition accompanied by a hysteresis loop.
文摘Modern society has been widely benefiting from the advances in wireless technology. During the past decade, extensive research efforts have been dedicated to develop the fifth-generation (5G) wireless mobile networks. This resulted in enabling technologies for the three generic connectivity types in 5G (broadband, massive Internet-of-things connectivity and ultra-reliable low latency communication) as well as their coexistence.
文摘In this paper,the performance of a mobile wireless communication network operating over the Fisher-Snedecor J composite fading channel is analyzed.Specifically,a multi-antenna base station transmits information to a single-antenna mobile receiver,which employs the maximal-ratio transmission technique to improve the quality of the received signal.The well-known random waypoint mobility model is assumed to characterize the mobility of the receiver.Under this mobility scenario,we derive exact closed-form expressions for the probability density function,cumulative distribution function,and consequently for the Outage Probability(OP),the average Bit Error Rate(BER)for different digital modulation schemes,and the average channel capacity.To shed light into the impact of different channel parameters,simple asymptotic expressions at the high SNR regime are obtained for the OP and average BER.To validate our analytical expressions,the comprehensive Monte-Carlo simulations are conducted under various configurations and both results are in excellent agreement.
文摘In the current mobile IPv6 (MIPv6) systems for the System architecture evaluation (SAE) networks, such as 4th generation (4G) mobile network, the data delivery is performed basing on a centralized mobility network anchor between Evolved Node B (eNB) and Serving Gateways (S-GW), and also between S-GW and Packet Data Network Gateway (P-GW). However, the existing network has many obstacles, including suboptimal data routing, injection of unwanted data traffic into mobile core network and the requirement of capital expenditure. To handle these challenges, here we describe a flat mobile core network scheme donated by F-EPC, based SAE mobile network. In the proposed scheme, the P-GW and S-GW gateways are features as one node named Cellular Gateway (C-GW). Further, we proposed to distribute and increase the number of C-GW in mobile core network, the Mobility Management Entity (MME) functioned as centralizing mobility anchor and allocating the IP address for the User Entity (UE). In this paper, the explained results of a simulation analysis showed that the proposed scheme provides a superior performance compared with the current 4G architecture in terms of total transmission delay, handover delay and initial attach procedure.
文摘In recent years, we need more bandwidth to enjoy entertainment contents such as video streaming, music and online gaming. To gain enough bandwidth, technologies that combine bandwidth by using multiple interfaces at same time are desired. Multipath transport protocols which combine multiple paths for packet delivery at the transport layer are a promising technology. Such protocols have a mechanism, called “packet scheduler”, to select the interface to send a packet. However, existing studies of the packet scheduler have not explicitly considered the compatibility of mobility with bonding of bandwidth. Therefore, when smartphone users move out of coverage of communication networks such as wireless Local Area Network (LAN) and Long Term Evolution (LTE) by vehicle, packet loss occurs, leading to a decrease of throughput. In this study, we propose a packet scheduler that selects an appropriate communication path so that packets can reach the peer before it moves out of the coverage. Based on routes of a vehicle and the position and communication range of the access point, the time at which a communication path will be lost is predicted. In addition, we employ MPQUIC (Multipath QUIC (Quick UDP Internet Connections)), which is a multipath transport protocol proposed as the extension of QUIC protocol, to reduce the ACK packet loss in multipath communication, and to reduce the time until the starts of retransmission. We evaluated the number of packet losses, the throughput and the time until starts of retransmission using a simulator and show the superiority of proposed method.
基金Project supported by the National Natural Science Foundation of China (Grant No.62073045)。
文摘We develop a policy of observer-based dynamic event-triggered state feedback control for distributed parameter systems over a mobile sensor-plus-actuator network.It is assumed that the mobile sensing devices that provide spatially averaged state measurements can be used to improve state estimation in the network.For the purpose of decreasing the update frequency of controller and unnecessary sampled data transmission, an efficient dynamic event-triggered control policy is constructed.In an event-triggered system, when an error signal exceeds a specified time-varying threshold, it indicates the occurrence of a typical event.The global asymptotic stability of the event-triggered closed-loop system and the boundedness of the minimum inter-event time can be guaranteed.Based on the linear quadratic optimal regulator, the actuator selects the optimal displacement only when an event occurs.A simulation example is finally used to verify that the effectiveness of such a control strategy can enhance the system performance.
基金supported by the National Natural Science Foundation of China(32172188)Science and Technology Cooperation Project of ZheJiang Province(2023SNJF058-3)。
文摘Multidrug-resistant(MDR)Enterobacteriaceae critically threaten duck farming and public health.The phenotypes,genotypes,and associated mobile genetic elements(MGEs)of MDR Enterobacteriaceae isolated from 6 duck farms in Zhejiang Province,China,were investigated.A total of 215 isolates were identified as Escherichia coli(64.65%),Klebsiella pneumoniae(12.09%),Proteus mirabilis(10.23%),Salmonella(8.84%),and Enterobacter cloacae(4.19%).Meanwhile,all isolates were resistant to at least two antibiotics.Most isolates carried tet(A)(85.12%),blaTEM(78.60%)and sul1(67.44%)resistance genes.Gene co-occurrence analysis showed that the resistance genes were associated with IS26 and integrons.A conjugative IncFII plasmid pSDM004 containing all the above MGEs was detected in Proteus mirabilis isolate SDM004.This isolate was resistant to 18 antibiotics and carried the blaNDM-5 gene.MGEs,especially plasmids,are the primary antibiotic resistance gene transmission route in duck farms.These findings provide a theoretical basis for the rational use of antibiotics in farms which are substantial for evaluating public health and food safety.