-
341
Performance analysis of dual non-orthogonal multiple access technology in the Internet of things
Published 2019-03-01“…With the rapid development of many technologies such as smart city,artificial intelligence and edge computing,the future Internet of things will face the problems of massive terminal access and spectrum resource constraints.A dual non-orthogonal multiple access (D-NOMA) technology based on high spectral efficiency secure access (HSESA) was proposed,which combined non-orthogonal access in the code domain and non-orthogonal multiplexing in the frequency domain,and had good spectral efficiency performance.The sender and receiver were optimized,and multiple users were mapped directly to the overlapping subcarriers through the sparse codebook.The performance analysis under the Rician channel shows that D-NOMA has better bit error rate performance than HSESA.…”
Get full text
Article -
342
Key technology and application of intelligent connected patrol vehicles for security scenario
Published 2020-04-01“…Practical applications combined with industry scene is a common problem in the present artificial intelligence technology.Facing the security application scenario,the practice landing of unmanned technology -- intelligent connected patrol vehicle was studied.Integrating different sensors such as camera,LiDAR,inertial navigation system (INS),etc,the awareness system can accurately identify the platform itself,road conditions and target behavior using key technology such as artificial intelligence (AI),data fusion.Combining human intelligence (HI) in scene cognition of human experience and artificial intelligence (AI) in cognition of computing,a hybrid intelligent cognitive system using to security scene was built.Based on human in the loop system architecture and technology such as 5G ,vehicle to everything (V2X),edge computing,etc,different interactions between human ,machine and environment were designed,which ensured the safe and reliable operation of the system and increased the work efficiency by a wide margin.…”
Get full text
Article -
343
5G core network deployment and evolution scheme
Published 2020-09-01“…Firstly,the disadvantages of NSA networking based on the 5G commercial situation of domestic operators were analyzed,it was suggested to control NSA investment and carry out 5G network construction with SA as the goal.Then based on combing the progress of 5G core network standard and the main changes of R16 standard,the commercial deployment of 5G SA core network based on regional network cloud and the following 2G/4G/5G convergence evolution planning and deployment proposal was analyzed,it included the commercial deployment suggestions of 5G edge computing nodes and the subsequent planning and construction suggestions.It was suggested that the planning and construction of 2G/4G/5G integrated networking should be carried out as soon as possible,in order to effectively protect investment,reduce the complexity of networking and maintenance,realize the target architecture of full cloud deployment of control plane and distributed sinking deployment of user plane.It provides reference for the construction of 5G SA core network.…”
Get full text
Article -
344
Research on multi-UAV energy consumption optimization algorithm for cellular-connected network
Published 2023-02-01“…In complex time-varying environment, the ground base station (GBS) may not assist the UAV.Therefore, a mobile edge computing (MEC) cellular-connected network based on digital twin (DT) technology was studied.Given the efficiency of multi-UAV, multiple high-altitude balloon (HAB) equipped with MEC servers were introduced.On this basis, an energy minimization problem for all UAV was proposed, and a multi-UAV trajectory optimization and resource allocation scheme was presented to solve it.The double deep Q-network (DDQN) was applied to handle the association between multi-UAV and multi-HAB, and the multi-UAV trajectory and computing resource allocation were jointly optimized by the successive convex approximation (SCA) and the block coordinate descent (BCD).Simulation experiments verify the feasibility and effectiveness of the proposed algorithm.The system energy consumption is reduced by 30%, better than the comparison algorithms.…”
Get full text
Article -
345
5G industry wireless private network technology and business requirement model
Published 2021-08-01“…5G industry wireless private network has become one of the most important services for operators enabling the vertical industry.The gradual maturity of virtualization, multi-access edge computing, network slicing and other technologies have provided a key technical guarantee for the development of 5G industry wireless private network.The development status, key technology, requirement model, challenges and development recommendations of 5G industry wireless private network were introduced.The concept and classification of 5G industry wireless private network were introduced, the key technologies were generalized, and the design ideas and the main reference index were put forward aiming at business requirement.Finally, the challenges faced by operators when developing 5G wireless private network services were summarized and development suggestions were given.…”
Get full text
Article -
346
Edge Intelligence-Based RAN Architecture for 6G Internet of Things
Published 2022-01-01“…Edge Intelligence, which blends Artificial Intelligence (AI) with Radio Access Network (RAN) and edge computing, is recommended as a crucial enabling technology for 6G to accommodate intelligent and efficient applications. …”
Get full text
Article -
347
Big data intelligent analysis technology for 5G network
Published 2022-08-01“…5G services are characterized by diversified forms, personalized requirements and extreme experience, which require the network to be able to efficiently perceive business characteristics and meet business requirements.Meanwhile, the introduction of complex technologies such as 5G slicing, edge computing and multi-access collaboration increases the complexity of end-to-end resource management and scheduling.As the network topology center and service convergence point, 5G core network needs to integrate artificial intelligence technology, improve the ability of big data analysis, and realize the automation and intelligence of the network .The research progress of the international organization for standardization in the field of 5G network intelligence was firstly introduced, then the architecture and characteristics of 5G network big data intelligent analysis system was proposed, and the potential three key technologies of network big data intelligent analysis were finally further analyzed.…”
Get full text
Article -
348
Trust evaluation algorithm of IoT edge server based on cooperation reputation and device feedback
Published 2022-02-01“…Aiming at the security problem of edge server, a trust evaluation algorithm was proposed, which integrated server cooperation reputation and device user feedback to improve the security of edge computing context.In the process of interaction, a fusion algorithm based on objective information entropy theory was used to aggregate the cooperation reputation between servers, and a partial homomorphic encryption algorithm was used to prevent the leakage of user data in the process of interaction.After the interaction, the highly trusted device node was selected to calculate the feedback trust, which overcame the malicious feedback of the traditional mechanism.When calculating the global trust, the expected score of the server and the adaptive weight calculation method were considered, which overcame the limitations of the traditional trust scheme.The experimental results show that the proposed trust calculation scheme has low time complexity and spatial complexity, and can effectively resist the attack of malicious nodes.…”
Get full text
Article -
349
Differential, Linear, and Meet-in-the-Middle Attacks on the Lightweight Block Cipher RBFK
Published 2023-01-01“…Randomized butterfly architecture of fast Fourier transform for key cipher (RBFK) is the lightweight block cipher for Internet of things devices in an edge computing environment. Although the authors claimed that RBFK is secure against differential cryptanalysis, linear cryptanalysis, impossible differential attack, and zero correlation linear cryptanalysis, the details were not explained in the literature. …”
Get full text
Article -
350
Research on 5G MEC security assessment system and method
Published 2023-08-01“…Multi-access edge computing (MEC) is deployed at the edge of the network, enabling efficient and fast data processing in mobile networks, while also undertaking important security functions, making MEC a prime target for attackers.Therefore, MEC nodes will face huge security risks.How to accurately evaluate and quantify MEC security capabilities is an urgent issue to be solved.For accurately evaluating and quantifying MEC security capabilities, the MEC safety assessment system was proposed in combination with MEC safety risks.The assessment indicators selected in the assessment system comprehensively reflect the basic characteristics of MEC and its complete safety capability.Based on this evaluation system, the MEC security evaluation method was designed by using the analytic hierarchy process (AHP) and fuzzy evaluation, the MEC vulnerability scoring system was creatively proposed, and the evaluation indicators were provided based on the results of MEC vulnerability scoring system, the MEC security capability quantification value was finally calculated.The experimental result proves the effectiveness of the method.…”
Get full text
Article -
351
Survey on Giant Constellation Cloud Network Integration
Published 2023-06-01“…Thanks to the development of aerospace technology and the rise of concepts such as cloud computing and edge computing, cloud network convergence networks based on giant constellations are expected to become an important part of the integrated construction of star-ground and 6G global communication networks.Unlike terrestrial communication networks, constellation network topology is highly dynamic and time-varying, with strong resource and link heterogeneity, and other characteristics that pose challenges for cloud network convergence.The characteristics of giant constellations and the development status of terrestrial cloud network convergence was summarized, the urgent needs and challenges of cloud network convergence in giant constellations were analyzed, and the innovation of satellite internet cloud network convergence architecture, the use of resource virtualization technology, information sensing and routing path planning based on artificial intelligence algorithms, and cloud computing and edge collaborative computing were potential directions for future satellite-based cloud network convergence technology development direction were further pointed out.…”
Get full text
Article -
352
Real-Time Detection of Milk Adulteration with a Portable Multispectral Analysis Device: A Multispectral Sensor and Optimized Logistic Regression Approach
Published 2024-12-01“…This study presents the development of a portable, low-cost, and edge computing-based system for real-time milk adulteration detection. …”
Get full text
Article -
353
Research and application of V2X based on MEC
Published 2020-06-01“…The large-scale construction of 5G wireless communication network enhances the development of C-V2X (cellular-vehicle to everything) towards diversified directions.Large bandwidth services,such as high-definition video and AR/VR,bring great transmission and processing pressure to the classical network architecture.Meanwhile,traffic safety services characterized by ultra-high reliability and low delay put stringent requirements on network performance.The network architecture of providing services and computing localization through setting user panel down to close to the terminals and MEC (multiple access edge computing) can meet the requirements of data short loop transmission and ultra-low delay in the internet of vehicles scenario.The combination of MEC and V2X was explored in depth,the MEC networking scenario,MEC network architecture and the key technologies and challenges of MEC were analyzed.The combination scheme of MEC and C-V2X integration of network planning was provided.The application of MEC in C-V2X was presented in several specific scenarios.…”
Get full text
Article -
354
Blockchain-driven distributed consensus mechanism in defensing Byzantine attack for the Internet of spectrum device
Published 2020-03-01“…To meet the requirement of the precisely spectrum sharing triggered by large-scale and ultra-dense deployment of mobile internet and internet of things,a framework based on blockchain technology for networking the massive personal wireless devices to form the Internet of spectrum device (IoSD) was proposed.The architecture of cloud with edge computing was proposed as the architecture of IoSD,which consists of spectrum management server,mobile base station,and personal wireless devices.The mechanism of spectrum data acquisition,spectrum block appending,spectrum data transmission,and spectrum sensing incentive,consist of basic operational mechanism of IoSD.The distributed consensus mechanism,including fusion consensus among sensing-nodes,verification consensusamong checking-nodes,and confirmation consensus among head-nodes,was applied to determine whether the spectrum data was falsified by the Byzantine attack of malicious sensing-nodesunder the hypothesis test of certain confidence.The simulation results show the effectiveness and robustness of proposed distributed consensus mechanism in preventing spectrum sensing data falsification by the malicious nodes.…”
Get full text
Article -
355
Joint optimization method of intelligent service arrangement and computing-networking resource allocation for MEC
Published 2023-07-01“…To solve the problems of low efficiency of network service caching and computing-networking resource allocation caused by tasks differentiation, highly dynamic network environment, and decentralized computing-networking resource deployment in edge networks, a decentralized service arrangement and computing offloading model for mobile edge computing was investigated and established.Considering the multidimensional resource constraints, e.g., computing power, storage, and bandwidth, with the objective of minimizing task processing latency, the joint optimization of service caching and computing-networking resource allocation was abstracted as a partially observable Markov decision process.Considering the temporal dependency of service request and its coupling relationship with service caching, a long short-term memory network was introduced to capture time-related network state information.Then, based on recurrent multi-agent deep reinforcement learning, a distributed service arrangement and resource allocation algorithm was proposed to autonomously decide service caching and computing-networking resource allocation strategies.Simulation results demonstrate that significant performance improvements in terms of cache hit rate and task processing latency achieved by the proposed algorithm.…”
Get full text
Article -
356
Management of MEC Service and Optimization of Mission Migration in LEO Satellite Networks
Published 2022-09-01“…Low earth orbit (LEO) satellites play an important role in the communication of earth observation and wide area coverage because of their advantages of short transmission delay and low deployment cost.Due to limited size and weight of LEO satellite platform, the function of each LEO satellite node is relatively single, which requires effi cient collaboration among various LEO satellite nodes to form a high-performance satellite network with decentralized functions and converged capabilities.It puts forward certain requirements for network service management.Aiming at the cooperative scenario that remote sensing satellites migrate observated task data to LEO satellite constellation with mobile edge computing (MEC) service deployed, the MEC service management model based on software defi ned network in LEO satellite networks was studied, a cross-slot task migration optimization method with the aid of time extended graph was proposed.The simulation results showed that the task migration optimization method could eff ectively reduced the cost of observation satellite processing tasks.And it could off ered the management model for LEO satellite networks that deployed MEC servers.…”
Get full text
Article -
357
Efficient Data Transmission for Community Detection Algorithm Based on Node Similarity in Opportunistic Social Networks
Published 2021-01-01“…When dividing communities, we use mobile edge computing to combine network topology attributes with social attributes. …”
Get full text
Article -
358
An intelligent and simplified 5G wireless network technology
Published 2021-05-01“…5G is the current focus of the development of the information and communication industry, and is gradually being deployed and commercialized.The 5G network will cover toC to toB, aiming at the interconnection of everything, so the complexity and challenges are unprecedented.In order to meet the needs of multiple scenarios, 5G network technology is complex and flexible in design, and the traditional management and operation methods are difficult and costly.At the same time, industry application requirements are very different and demanding.All of these require integrated solutions such as cloud-network integration and network industry collaboration.In response to the above-mentioned problems and needs, an intelligent and simplified 5G wireless network technology framework was proposed.Through innovative thinking and technology development of wireless networks, 5G and artificial intelligence, cloud computing, big data, edge computing and other new technologies were integrated and innovated to continuously improve 5G capabilities and promote the deep convergence of 5G and DOICT.A detailed introduction to the entire framework, platforms and applications in the above technology system were given.Finally, a technical outlook was proposed for shaping a new 5G ecology that supported green, smart, efficient operation, and the internet of everything.…”
Get full text
Article -
359
Retracted: Cloud Network and Mathematical Model Calculation Scheme for Dynamic Big Data
Published 2020-01-01“…This paper aims to study a new cloud hybrid network architecture based on edge computing. This article uses this architecture to tectonic fog calculation layer between cloud servers and devices using edge devices such as communications and networks. …”
Get full text
Article -
360
Artificial intelligence Internet of Things: A new paradigm of distributed sensor networks
Published 2022-03-01“…The article also discusses the combination of smart sensors, edge computing, and software-defined networks as enabling technologies for the artificial intelligence Internet of Things.…”
Get full text
Article