-
841
Survey on research progress for compute first networking
Published 2021-10-01“…With the development of 5G and mobile Internet technology, cloud computing, edge computing and intelligent terminal devices have been developed rapidly.Computing resources indicate a trend of ubiquitous deployment.How to use ubiquitous computing resources efficiently and collaboratively has become a hot topic at present in network field.In this context, the concept of compute first networking (CFN) has been proposed and attracted wide attention.Its basic idea is to enhance utilization of computing resources and improve user experience of network services, by converging computing and network deeply as well as coordinating distributed computing resources.Firstly the background and research status of CFN were analyzed, and then basic structure, workflow, and key technologies about CFN were explicated.Finally, future research directions and challenges about CFN were summarized.…”
Get full text
Article -
842
2D Gain Enhancement Based on Single-Layer SIW Corrugated Technique with Slot Array Feeder
Published 2018-01-01“…Overall, our proposed technique will be beneficial for the design of high-gain antenna in 5G wireless terminals.…”
Get full text
Article -
843
Full-duplex device-to-device communications:key technologies and prospects
Published 2018-05-01“…Due to the physical proximity,D2D communications can bring proximity gain,reusing gain and hop gain,and thus can potentially increase system spectral-efficiency and energy-efficiency.Full-duplex D2D communications,which enable the transceiver to simultaneously transmit and receive in the same band,can further improve the system performance.Therefore,full-duplex D2D communications has being considered as one of the key techniques in the next generation cellular networks.The features of full-duplex D2D communications and the significance in 5G systems were briefly introduced as well as its applications.Then,the state-of-art research on full-duplex D2D resource allocation was presented and discussed.Finally,some research topics that deserve further study was outlined and concluded.…”
Get full text
Article -
844
Technologies,standards and applications of LTE-V2X for vehicular networks
Published 2018-04-01“…V2X (vehicle to everything) communication is the critical technology to provide environment sensing,information exchange and cooperative control capabilities in vehicular networks.LTE-V2X,as one of the major V2X communication standards initiated and mainly driven by Datang Telecom,can enable low latency,high reliability,high data rate and security in communications,as well as scale economies by sharing the existing LTE network and terminal chipsets.LTE-V2X communication technology was introduced,and compared with IEEE 802.11p standards.Then,the progress of LTE-V2X standardization,industrial research and development and trials and field testing works were provided.Finally,the development strategy of LTE-V2X and technical evolution towards 5G was discussed.…”
Get full text
Article -
845
Management technologies of cyberspace endogenous safety and security test site
Published 2021-03-01“…The cyber range has been widely recognized as an effective way to study the technologies of network attack/defense and the vulnerability of network architecture.The endogenous safety and security test site that receives high attention recently is a type of cyber range for cyber space endogenous safety and security technologies.Based on the new situation of cyberspace with 5G development, a test site management technology for virtual-real network settings was proposed, and a test site management architecture based on the endogenously secured software defined network controller was designed.A design of the endogenously secured network control system was also proposed, which used a middle layer forwarding agent to achieve data isolation and supported multiple heterogeneous open-source controllers.Finally, a test site scenario reconfiguration and resource orchestration method was proposed based on a test site networking scheme.…”
Get full text
Article -
846
A survey of resource allocation in non-orthogonalmultiple access systems
Published 2018-08-01“…Non-orthogonalmultiple access(NOMA)is an important candidate technology of the fifth generation(5G)wireless network,which canmeet the low latency,low power consumption,high reliability,high throughput,wide coverage requirements of the next generationmobile communication systems.NOMA utilizes superposition coding at the transmitter and successive interference cancellation at the receiveRto allow several users’datamultiplexing in the same resource block.It improves the spectrum efficiency compared with the traditional orthogonalmultiple access.The research status of resource allocation of NOMA systems was summarized including single-carrier NOMA resource allocation,multi-carrier NOMA resource allocation,cooperative NOMA relay resource allocation,and cooperative NOMA resource allocation under hardware impairment conditions.Finally,themain problems in the current study were summarized and the research challenges and some future research directions of NOMA resource allocation technology were discussed.…”
Get full text
Article -
847
Survey of identity resolution system in industrial Internet of things
Published 2019-11-01“…With the development of the internet of things (IoT),5G and industrial technology,industrial IoT has become a new research field.Due to the specific requirements of delay,security and stability in industrial production,the traditional DNS has limitations to meet the needs of industrial IoT because of its single identity object,rigid resolution results,and weak security.In this context,how to provide efficient,flexible and secure resolution services for universal objects has become a hot area worldwide.Firstly,we discussed the design principles and key supporting technologies of the identity resolution system in industrial IoT.Then summarized and compared the existing identity resolution systems in detail.Next,the new identity resolution schemes in academic research were introduced.Finally,the core problems and the future research trend in this field were discussed.…”
Get full text
Article -
848
Standard system of IPv6+ technologies
Published 2020-08-01“…The vision of IPv6+ is to unleash the potential of IPv6 technology with necessary extensions and enhancement,so as to meet the requirement in 5G and cloud era to IP network,such as high scalability,high reliability,new services and intelligence network.IPv6+ consists of a series of protocol and technology innovation:such as SRv6 network programming,network slicing (VPN+),in-situ flow information telemetry (iFIT),next generation multicast (BIER),service function chaining (SFC),deterministic networking (DetNet),and application-aware IPv6 networking (APN6).These technologies are currently under development in several standard organizations,and can be classified into three phases.Standardization is one of the most important work of IPv6+ innovation.The standard system of IPv6+ technologies were defined,including the related standard organization,the whole picture of the IPv6+ standards,the three phases of IPv6+ standardization and key technologies and standard layout of each phase.…”
Get full text
Article -
849
Issues of identity verification of typical applications over mobile terminal platform
Published 2020-12-01“…Recent studies have shown that attacks against USIM card are increasing,and an attacker can use the cloned USIM card to bypass the identity verification process in some applications and thereby get the unauthorized access.Considering the USIM card being cloned easily even under 5G network,the identity verification process of the popular mobile applications over mobile platform was analyzed.The application behaviors were profiled while users were logging in,resetting password,and performing sensitive operations,thereby the tree model of application authentication was summarized.On this basis,58 popular applications in 7 categories were tested including social communication,healthcare,etc.It found that 29 of them only need SMS verification codes to get authenticated and obtain permissions.To address this issue,two-step authentication was suggested and USIM anti-counterfeiting was applied to assist the authentication process.…”
Get full text
Article -
850
Research on the development and business trend of holographic technology under 6G network
Published 2021-11-01“…Research on 6G has been carried out on a global scale.Focusing on holographic interactive services under 6G, the requirements for future network performance by studying holographic interactive scenarios and services were analyzed.A basis for business requirements for the design and research and technological evolution of 6G networks was provided.The holographic technology and application status, holographic communication and holographic interaction scenarios, as well as the technical indicators and network performance requirements of the scene business were studied.The holographic technology development stage, development maturity, holographic industry chain under 5G, and holographic technology application field distribution were defined.A holographic scene pool and scene characteristics were constructed, and six types of application scenes were formed based on the characteristics.Through the calculation of technical indicators, the bandwidth performance requirements of holographic portrait transmission were proposed.…”
Get full text
Article -
851
Research of embedding algorithm for wireless network virtualization
Published 2017-01-01“…Wireless network virtualization has become one of the promising techniques in fifth generation mobile networks (5G),and the virtual network embedding plays a very important role.A model was formulated to describe the problem and a wireless virtual network embedding algorithm based on joint bandwidth and power allocation (WVNEA-JBP) was put forward,which selected the suitable node and path to serve the data transmission from virtual networks.In order to minimize the overhead while satisfy the higher capacity request,this algorithm considered the impact of interference of wireless links and supports path splitting.A case study was introduced to show how WVNEA-JBP to work.Furthermore,simulation results show that WVNEA-JBP is able to accomplish the efficient utilization of network resources and improve the accept rate of virtual network requests.…”
Get full text
Article -
852
GAN-based channel estimation for massive MIMO system
Published 2021-06-01“…As a key technology of 5G, massive MIMO system can significantly improve spectrum efficiency and energy efficiency by equipping a large number of antennas in base stations.However, in massive MIMO system, accurate channel estimation faces severe challenges.In order to estimate the channel accurately when the pilot sequence length is smaller than the number of transmitting antennas and the channel noise is strong, the estimation method N2N-GAN was proposed.N2N-GAN firstly denoised the pilot channel at the receiving end, and then used the conditional generative adversarial network to estimate the channel matrix according to the denoised pilot signal.Simulation experiments show that N2N-GAN achieves better robustness against noise compared with traditional channel estimation algorithms and deep learning-based methods.Meanwhile, it can adapt to scenarios with fewer pilot symbols and more antennas.…”
Get full text
Article -
853
Study on the User Density Identification via Improved Whale Optimization Algorithm in Device-to-Device Communication
Published 2019-01-01“…The present study proposes a new algorithm for device-to-device (D2D) user density identification in a 5G network based on resource allocation. The method initially established a multiobjective optimization function that calculates system throughput and quality of service (QoS) of D2D users. …”
Get full text
Article -
854
Low complexity codebook search method in massive MIMO system
Published 2019-01-01“…In Massive MIMO systems for 5G networks,precoding technology is one of the key technologies.Aiming at user side codebook search method of the discrete Fourier transform (DFT) rotation codebook,a low complexity search algorithm was proposed.In this algorithm,all horizontal and vertical codebooks were grouped separately according to the characteristics that the precoding vectors with the same column of DFT rotation codebooks had the smallest chordal distance and the smaller chordal distance have the stronger correlation,and then the optimal horizontal and vertical codewords with maximum channel gain were obtained to form 3D precoding code-books.The simulation results indicate that the searching complexity of the proposed method is significantly reduced under conditions of insuring the system performance,moreover,this advantage becomes greater with the number of antennas increasing.…”
Get full text
Article -
855
Construction of Intelligent Building Integrated Evaluation System Based on BIM Technology
Published 2022-01-01“…The software communicates with the monitoring system through 5G public network and applies the unique advantages of deep neural network in classification to the assessment of the health status of old bridges with the help of the multiclassification convolutional neural network embedded in the software. …”
Get full text
Article -
856
Influence of drought stress on phosphorus dynamics and maize growth in tropical ecosystems
Published 2025-01-01“…P uptake was highest at FC100 (5 g kg−¹) and lowest at FC20 (3.5 g kg−¹). Similarly, biomass was greatest at FC100 (70 g plant−¹) and declined to 35 g plant−¹ at FC20, underscoring the adverse effects of drought on P availability and growth. …”
Get full text
Article -
857
Biodegradation of Phenol at High Initial Concentration by <i>Rhodococcus opacus</i> 3D Strain: Biochemical and Genetic Aspects
Published 2025-01-01“…The free-living and immobilized cells can decompose phenol concentrations up to 1.5 g/L and 2.5 g/L, respectively. The decomposition of the toxicant was catalyzed by the enzymes catechol 1,2-dioxygenase and <i>cis</i>,<i>cis</i>-muconate cycloisomerase. …”
Get full text
Article -
858
Effect of supplementing phytase on piglet performance, nutrient digestibility and bone mineralisation
Published 2020-07-01“…The basal diets contained reduced digestible phosphorus (P) and calcium (Ca) (1.5 g/kg digestible P, and Ca 5.5 g/kg and 5.6 g/kg for weaner and pre-starter, respectively) to provide a negative control. …”
Get full text
Article -
859
Periodically poled aluminum scandium nitride bulk acoustic wave resonators and filters for communications in the 6G era
Published 2025-01-01“…Abstract Bulk Acoustic Wave (BAW) filters find applications in radio frequency (RF) communication systems for Wi-Fi, 3G, 4G, and 5G networks. In the beyond-5G (potential 6G) era, high-frequency bands (>8 GHz) are expected to require resonators with high-quality factor (Q) and electromechanical coupling ( $${k}_{t}^{2}$$ k t 2 ) to form filters with low insertion loss and high selectivity. …”
Get full text
Article -
860
Effects of Dietary Pectin and Lactobacillus salivarius ATCC 11741 on Growth Performance, Immunocompetence, Gut Microbiota, Antioxidant Capacity, and Disease Resistance in Narrow-Cl...
Published 2022-01-01“…During 18 weeks trial feeding, 525 narrow-clawed crayfish juvenile (8.07±0.1 g) fed with seven experimental diets including control (basal diet), LS1 (1×107 CFU/g), LS2 (1×109 CFU/g), PE1 (5 g/kg), PE2 (10 g/kg), LS1PE1 (1×107 CFU/g +5 g/kg), and LS2PE2 (1×109 CFU/g +10 g/kg). …”
Get full text
Article