An analytical approach to evaluate the performance of the 3G/ad hoc integrated network is presented. A channel model capturing both path loss and shadowing is applied to the analysis so as to characterize power fallof...An analytical approach to evaluate the performance of the 3G/ad hoc integrated network is presented. A channel model capturing both path loss and shadowing is applied to the analysis so as to characterize power falloff vs. distance. The 3G/ad hoc integrated network scenario model is introduced briefly. Based on this model, several performances of the 3G/ ad hoc integrated network in terms of outage probability, call dropping probability and new call blocking probability are evaluated. The corresponding performance formulae are deduced in accordance with the analytical models. Meanwhile, the formula of the 3G/ad hoc integrated network capacity is deduced on the basis of the formula of the outage probability. It is observed from extensive simulation and numerical analysis that the 3G/ad hoc integrated network remarkably outperforms the 3G network with regards to the network performance. This derived evaluation approach can be applied into planning and optimization of the 3G/ad hoc network.展开更多
AIM: To evaluate the effect of internal limiting membrane(ILM) peeling with indocyanine green(ICG), brilliant blue G(BBG), triamcinolone acetonide(TA), trypan blue(TB), or without dye for the treatment of idiopathic m...AIM: To evaluate the effect of internal limiting membrane(ILM) peeling with indocyanine green(ICG), brilliant blue G(BBG), triamcinolone acetonide(TA), trypan blue(TB), or without dye for the treatment of idiopathic macular hole(IMH). METHODS: A search was conducted using Pub Med, EMBASE, and CENTRAL(Cochrane Central Register of Controlled Trials) for related studies published before October 2018. RESULTS: A total of 29 studies and 2514 eyes were included in this network Meta-analysis. For IMH closure, the rank from the best to the worse treatment was: BBG, TB, TA, ICG, and no dye. There was a significant difference in postoperative IMH closure rate between BBG and no dye. The rank of the best to the worse treatment to improve visual acuity was: BBG, TB, no dye, TA, and ICG. The improvement rate of visual acuity after using BBG was significantly higher than ICG. The improvement rate of visual acuity was more favorable with TB than ICG, TA, and no dye. CONCLUSION: BBG can contribute to better anatomical and functional outcomes compared to other dyes for ILM peeling in patients with IMH. The results show that the best treatment of ILM peeling with dyes is BBG.展开更多
Providing alternative PNT service to GNSS-challenged users will be an important function of next-generation NGSO broadband satellite communication systems.Herein,a packet-based PNT service architecture in NGSO broadba...Providing alternative PNT service to GNSS-challenged users will be an important function of next-generation NGSO broadband satellite communication systems.Herein,a packet-based PNT service architecture in NGSO broadband systems is proposed in which a primary satellite and selected assistant satellites work together to provide PNT service to requesting users.Its positioning performance bounds are mathematically formulated by rigorously analyzing the bounds constrained by different waveforms.Simulations are conducted on different configurations of Walker Delta MEO constellations and Walker Star LEO constellations for corroboration,revealing the following:(1)Both MEO and LEO constellations achieve sub-meter-level positioning precision given enough satellites.(2)Compared to the GNSS Doppler-based velocity estimation method,the position advance based velocity estimation algorithm is more precise and applicable to the PNT service in NGSO broadband systems.(3)To provide PNT service to users in GNSS-challenged environments,the primary and each assistant satellite need only∼0.1‰of the time of one downlink beam.展开更多
The FuTURE 4G Time Division Duplex(TDD)trial system uses 3.5 GHz carrier frequency and several crucial technologies including broadband Multiple Input Multiple Output(MIMO)and Orthogonal Frequency Division Multiplexin...The FuTURE 4G Time Division Duplex(TDD)trial system uses 3.5 GHz carrier frequency and several crucial technologies including broadband Multiple Input Multiple Output(MIMO)and Orthogonal Frequency Division Multiplexing(OFDM).These technologies challenge the link budget and networking analysis of the FuTURE 4G TDD trial network.This paper analyzes the practical 3.5 GHz propagation model and the link budget of Radio Frequency(RF)parameters of the trial system.Moreover,it introduces networking analysis and network planning of the trial system,which combines the field test results of the MIMO system.The FuTURE 4G TDD trial system and its trial network have been accomplished with successful checkup.The trial system fulfills all the requirements with two Access Points(AP)and three Mobile Terminals(MT),which supports multi-user,mobility,a high peak rate of 100 Mb/s,High-Definition TV(HDTV),high-speed data download,and Voice over IP(VoIP)services.展开更多
With rising capacity demand in mobile networks, the infrastructure is also becoming increasingly denser and complex. This results in collection of larger amount of raw data(big data) that is generated at different lev...With rising capacity demand in mobile networks, the infrastructure is also becoming increasingly denser and complex. This results in collection of larger amount of raw data(big data) that is generated at different levels of network architecture and is typically underutilized. To unleash its full value, innovative machine learning algorithms need to be utilized in order to extract valuable insights which can be used for improving the overall network's performance. Additionally, a major challenge for network operators is to cope up with increasing number of complete(or partial) cell outages and to simultaneously reduce operational expenditure. This paper contributes towards the aforementioned problems by exploiting big data generated from the core network of 4 G LTE-A to detect network's anomalous behavior. We present a semi-supervised statistical-based anomaly detection technique to identify in time: first, unusually low user activity region depicting sleeping cell, which is a special case of cell outage; and second, unusually high user traffic area corresponding to a situation where special action such as additional resource allocation, fault avoidance solution etc. may be needed. Achieved results demonstrate that the proposed method can be used for timely and reliable anomaly detection in current and future cellular networks.展开更多
The paper mainly focuses on the network planning and optimization problem in the 5G telecommunication system based on the numerical investigation.There have been two portions of this work,such as network planning for ...The paper mainly focuses on the network planning and optimization problem in the 5G telecommunication system based on the numerical investigation.There have been two portions of this work,such as network planning for efficient network models and optimization of power allocation in the 5G network.The radio network planning process has been completed based on a specific area.The data rate requirement can be solved by allowing the densification of the system by deploying small cells.The radio network planning scheme is the indispensable platform in arranging a wireless network that encounters convinced coverage method,capacity,and Quality of Service necessities.In this study,the eighty micro base stations and two-hundred mobile stations are deployed in the-15km×15km wide selected area in the Yangon downtown area.The optimization processes were also analyzed based on the source and destination nodes in the 5G network.The base stations’location is minimized and optimized in a selected geographical area with the linear programming technique and analyzed in this study.展开更多
Future components to enhance the basic,native security of 5G networks are either complex mechanisms whose impact in the requiring 5G communications are not considered,or lightweight solutions adapted to ultrareliable ...Future components to enhance the basic,native security of 5G networks are either complex mechanisms whose impact in the requiring 5G communications are not considered,or lightweight solutions adapted to ultrareliable low-latency communications(URLLC)but whose security properties remain under discussion.Although different 5G network slices may have different requirements,in general,both visions seem to fall short at provisioning secure URLLC in the future.In this work we address this challenge,by introducing cost-security functions as a method to evaluate the performance and adequacy of most developed and employed non-native enhanced security mechanisms in 5G networks.We categorize those new security components into different groups according to their purpose and deployment scope.We propose to analyze them in the context of existing 5G architectures using two different approaches.First,using model checking techniques,we will evaluate the probability of an attacker to be successful against each security solution.Second,using analytical models,we will analyze the impact of these security mechanisms in terms of delay,throughput consumption,and reliability.Finally,we will combine both approaches using stochastic cost-security functions and the PRISM model checker to create a global picture.Our results are first evidence of how a 5G network that covers and strengthened all security areas through enhanced,dedicated non-native mechanisms could only guarantee secure URLLC with a probability of∼55%.展开更多
The exponential growth of the number of network devices in recent years not only entails the need for automation of management tasks,but also leads to the increase of available network data and metadata.5G and beyond ...The exponential growth of the number of network devices in recent years not only entails the need for automation of management tasks,but also leads to the increase of available network data and metadata.5G and beyond standards already cover those requirements and also include the need to define and use machine learning techniques to take advantage of the data acquired,especially using geolocated Call Detail Record(CDR)data sets.However,this scenario requires novel cellular network analysis methodologies to exploit all these available data,especially for the network usage pattern in order to ease the management tasks.In this work,a novel method based on information theory metrics like the Kullback-Leibler divergence and data classification algorithms is proposed to identify representative urban areas in terms of the network usage pattern.Methodology validation is performed via computer analysis using the Open Big Data CDR data set in the Milan area for different scenarios.Obtained results validate the proposed methodology and also reveal its adaptability in terms of specific scenario characteristics.Network usage patterns are calculated for each representative area,paving the path to several future research lines in network management,such as network usage prediction based on this methodology and using the comportment time series.展开更多
This paper takes the right branch main channel Bridge of Huai River Bridge in Huainan as the engineering background, uses the finite element software Midas and the ANSYS to simulate and analyze the jacking constructio...This paper takes the right branch main channel Bridge of Huai River Bridge in Huainan as the engineering background, uses the finite element software Midas and the ANSYS to simulate and analyze the jacking construction of the bridge, and according to the theoretical calculation, the construction monitoring plan is developed, and the stress and deformation of the key section and part of the structure are monitored. Construction monitoring combined with 3 g network and data acquisition module, monitoring data for the real time measurement, the centralized acquisition and wireless transmission, accomplish on-line real-time monitoring of the bridge construction process, effective control of jacking construction and monitoring. The comparison between theoretical analysis and measured results shows that the simulation results are reasonable, and the construction monitoring scheme based on 3G network and data collection can be used as reference.展开更多
The study of the development cost of general aviation aircraft is limited by small samples with many cost-driven factors. This paper investigates a parametric modeling method for prediction of the development cost of ...The study of the development cost of general aviation aircraft is limited by small samples with many cost-driven factors. This paper investigates a parametric modeling method for prediction of the development cost of general aviation aircraft. The proposed technique depends on some principal components, acquired by utilizing P value analysis and gray correlation analysis. According to these principal components, the corresponding linear regression and BP neural network models are established respectively. The feasibility and accuracy of the P value analysis are verified by comparing results of model fitting and prediction. A sensitivity analysis related to model precision and suitability is discussed in detail. Results obtained in this study show that the proposed method not only has a certain degree of versatility, but also provides a preliminary prediction of the development cost of general aviation aircraft.展开更多
After spinal cord injury, dysregulated miRNAs appear and can participate in inflammatory responses, as well as the inhibition of apoptosis and axon regeneration through multiple pathways. However, the functions of miR...After spinal cord injury, dysregulated miRNAs appear and can participate in inflammatory responses, as well as the inhibition of apoptosis and axon regeneration through multiple pathways. However, the functions of miRNAs in spinal cord ischemia-reperfusion injury progression remain unclear. miRCURY LNATM Arrays were used to analyze miRNA expression profiles of rats after 90 minutes of ischemia followed by reperfusion for 24 and 48 hours. Furthermore, subsequent construction of aberrantly expressed miRNA regulatory patterns involved cell survival, proliferation, and apoptosis. Remarkably, the mitogen-activated protein kinase(MAPK) signaling pathway was the most significantly enriched pathway among 24-and 48-hour groups. Bioinformatics analysis and quantitative reverse transcription polymerase chain reaction confirmed the persistent overexpression of miR-22-3 p in both groups. These results suggest that the aberrant miRNA regulatory network is possibly regulated MAPK signaling and continuously affects the physiological and biochemical status of cells, thus participating in the regulation of spinal cord ischemia-reperfusion injury. As such, miR-22-3 p may play sustained regulatory roles in spinal cord ischemia-reperfusion injury. All experimental procedures were approved by the Animal Ethics Committee of Jilin University, China [approval No. 2020(Research) 01].展开更多
基金The National Natural Science Foundation of China(No.60872004)the Research Fund of National Mobile Communications Research Laboratory of Southeast University(No.2010A08)the Fundamental Research Funds for the Central Universities(No.2009B21814)
文摘An analytical approach to evaluate the performance of the 3G/ad hoc integrated network is presented. A channel model capturing both path loss and shadowing is applied to the analysis so as to characterize power falloff vs. distance. The 3G/ad hoc integrated network scenario model is introduced briefly. Based on this model, several performances of the 3G/ ad hoc integrated network in terms of outage probability, call dropping probability and new call blocking probability are evaluated. The corresponding performance formulae are deduced in accordance with the analytical models. Meanwhile, the formula of the 3G/ad hoc integrated network capacity is deduced on the basis of the formula of the outage probability. It is observed from extensive simulation and numerical analysis that the 3G/ad hoc integrated network remarkably outperforms the 3G network with regards to the network performance. This derived evaluation approach can be applied into planning and optimization of the 3G/ad hoc network.
基金Supported by the National Natural Science Foundation of China (No.81870686)the Natural Science Foundation of Beijing Municipal (No.7184201)the Capital’s Funds for Health Improvement and Research (No.2018-12021)
文摘AIM: To evaluate the effect of internal limiting membrane(ILM) peeling with indocyanine green(ICG), brilliant blue G(BBG), triamcinolone acetonide(TA), trypan blue(TB), or without dye for the treatment of idiopathic macular hole(IMH). METHODS: A search was conducted using Pub Med, EMBASE, and CENTRAL(Cochrane Central Register of Controlled Trials) for related studies published before October 2018. RESULTS: A total of 29 studies and 2514 eyes were included in this network Meta-analysis. For IMH closure, the rank from the best to the worse treatment was: BBG, TB, TA, ICG, and no dye. There was a significant difference in postoperative IMH closure rate between BBG and no dye. The rank of the best to the worse treatment to improve visual acuity was: BBG, TB, no dye, TA, and ICG. The improvement rate of visual acuity after using BBG was significantly higher than ICG. The improvement rate of visual acuity was more favorable with TB than ICG, TA, and no dye. CONCLUSION: BBG can contribute to better anatomical and functional outcomes compared to other dyes for ILM peeling in patients with IMH. The results show that the best treatment of ILM peeling with dyes is BBG.
基金the National Key Research and Development Program of China(2020YFB1804800)the National Natural Science Foundation of China(No.62071270).
文摘Providing alternative PNT service to GNSS-challenged users will be an important function of next-generation NGSO broadband satellite communication systems.Herein,a packet-based PNT service architecture in NGSO broadband systems is proposed in which a primary satellite and selected assistant satellites work together to provide PNT service to requesting users.Its positioning performance bounds are mathematically formulated by rigorously analyzing the bounds constrained by different waveforms.Simulations are conducted on different configurations of Walker Delta MEO constellations and Walker Star LEO constellations for corroboration,revealing the following:(1)Both MEO and LEO constellations achieve sub-meter-level positioning precision given enough satellites.(2)Compared to the GNSS Doppler-based velocity estimation method,the position advance based velocity estimation algorithm is more precise and applicable to the PNT service in NGSO broadband systems.(3)To provide PNT service to users in GNSS-challenged environments,the primary and each assistant satellite need only∼0.1‰of the time of one downlink beam.
基金the National Natural Science Foundation of China under Grant 60496312the 863 Program of China under Grants 2003AA12331004 and 2006AA01Z260.
文摘The FuTURE 4G Time Division Duplex(TDD)trial system uses 3.5 GHz carrier frequency and several crucial technologies including broadband Multiple Input Multiple Output(MIMO)and Orthogonal Frequency Division Multiplexing(OFDM).These technologies challenge the link budget and networking analysis of the FuTURE 4G TDD trial network.This paper analyzes the practical 3.5 GHz propagation model and the link budget of Radio Frequency(RF)parameters of the trial system.Moreover,it introduces networking analysis and network planning of the trial system,which combines the field test results of the MIMO system.The FuTURE 4G TDD trial system and its trial network have been accomplished with successful checkup.The trial system fulfills all the requirements with two Access Points(AP)and three Mobile Terminals(MT),which supports multi-user,mobility,a high peak rate of 100 Mb/s,High-Definition TV(HDTV),high-speed data download,and Voice over IP(VoIP)services.
基金supported in part by the National Natural Science Foundation of China under the Grants No.61431011 and 61671371the National Science and Technology Major Project under Grant no.2016ZX03001016-005+1 种基金the Key Research and Development Program of Shaanxi Province under Grant No.2017ZDXM-G-Y-012the Fundamental Research Funds for the Central Universities
文摘With rising capacity demand in mobile networks, the infrastructure is also becoming increasingly denser and complex. This results in collection of larger amount of raw data(big data) that is generated at different levels of network architecture and is typically underutilized. To unleash its full value, innovative machine learning algorithms need to be utilized in order to extract valuable insights which can be used for improving the overall network's performance. Additionally, a major challenge for network operators is to cope up with increasing number of complete(or partial) cell outages and to simultaneously reduce operational expenditure. This paper contributes towards the aforementioned problems by exploiting big data generated from the core network of 4 G LTE-A to detect network's anomalous behavior. We present a semi-supervised statistical-based anomaly detection technique to identify in time: first, unusually low user activity region depicting sleeping cell, which is a special case of cell outage; and second, unusually high user traffic area corresponding to a situation where special action such as additional resource allocation, fault avoidance solution etc. may be needed. Achieved results demonstrate that the proposed method can be used for timely and reliable anomaly detection in current and future cellular networks.
基金This work was fully supported by U Nyi Hla Nge Foundation at Yangon Technological University,Gyogone,Insein PO,11011,Yangon,Myanmar。
文摘The paper mainly focuses on the network planning and optimization problem in the 5G telecommunication system based on the numerical investigation.There have been two portions of this work,such as network planning for efficient network models and optimization of power allocation in the 5G network.The radio network planning process has been completed based on a specific area.The data rate requirement can be solved by allowing the densification of the system by deploying small cells.The radio network planning scheme is the indispensable platform in arranging a wireless network that encounters convinced coverage method,capacity,and Quality of Service necessities.In this study,the eighty micro base stations and two-hundred mobile stations are deployed in the-15km×15km wide selected area in the Yangon downtown area.The optimization processes were also analyzed based on the source and destination nodes in the 5G network.The base stations’location is minimized and optimized in a selected geographical area with the linear programming technique and analyzed in this study.
基金The publication is produced within the framework of Ramon Alcarria y Borja Bordel’s research projects on the occasion of their stay at Argonne Labs(Jose Castillejo’s 2021 grant)supported by the Ministry of Science,Innovation andUniversities through the COGNOS project.
文摘Future components to enhance the basic,native security of 5G networks are either complex mechanisms whose impact in the requiring 5G communications are not considered,or lightweight solutions adapted to ultrareliable low-latency communications(URLLC)but whose security properties remain under discussion.Although different 5G network slices may have different requirements,in general,both visions seem to fall short at provisioning secure URLLC in the future.In this work we address this challenge,by introducing cost-security functions as a method to evaluate the performance and adequacy of most developed and employed non-native enhanced security mechanisms in 5G networks.We categorize those new security components into different groups according to their purpose and deployment scope.We propose to analyze them in the context of existing 5G architectures using two different approaches.First,using model checking techniques,we will evaluate the probability of an attacker to be successful against each security solution.Second,using analytical models,we will analyze the impact of these security mechanisms in terms of delay,throughput consumption,and reliability.Finally,we will combine both approaches using stochastic cost-security functions and the PRISM model checker to create a global picture.Our results are first evidence of how a 5G network that covers and strengthened all security areas through enhanced,dedicated non-native mechanisms could only guarantee secure URLLC with a probability of∼55%.
基金partially supported by the grant TED2021131699B-I00/AEI/10.13039/501100011033/European Union Next Generation EU/PRTRthe Spanish Ministry of Science and Innovation,grants PID2020-112545RB-C54 and PDC2022-133900-I00the Univ.Rey Juan Carlos Program for Research Promotion and Development(Ref.F799 and F920)。
文摘The exponential growth of the number of network devices in recent years not only entails the need for automation of management tasks,but also leads to the increase of available network data and metadata.5G and beyond standards already cover those requirements and also include the need to define and use machine learning techniques to take advantage of the data acquired,especially using geolocated Call Detail Record(CDR)data sets.However,this scenario requires novel cellular network analysis methodologies to exploit all these available data,especially for the network usage pattern in order to ease the management tasks.In this work,a novel method based on information theory metrics like the Kullback-Leibler divergence and data classification algorithms is proposed to identify representative urban areas in terms of the network usage pattern.Methodology validation is performed via computer analysis using the Open Big Data CDR data set in the Milan area for different scenarios.Obtained results validate the proposed methodology and also reveal its adaptability in terms of specific scenario characteristics.Network usage patterns are calculated for each representative area,paving the path to several future research lines in network management,such as network usage prediction based on this methodology and using the comportment time series.
文摘This paper takes the right branch main channel Bridge of Huai River Bridge in Huainan as the engineering background, uses the finite element software Midas and the ANSYS to simulate and analyze the jacking construction of the bridge, and according to the theoretical calculation, the construction monitoring plan is developed, and the stress and deformation of the key section and part of the structure are monitored. Construction monitoring combined with 3 g network and data acquisition module, monitoring data for the real time measurement, the centralized acquisition and wireless transmission, accomplish on-line real-time monitoring of the bridge construction process, effective control of jacking construction and monitoring. The comparison between theoretical analysis and measured results shows that the simulation results are reasonable, and the construction monitoring scheme based on 3G network and data collection can be used as reference.
基金supported by the National Postdoctoral Program for Innovative Talents, Postdoctoral Science Foundation of China (No. 2017M610740)supports from Hefei General Aviation Research Institute, Beihang University
文摘The study of the development cost of general aviation aircraft is limited by small samples with many cost-driven factors. This paper investigates a parametric modeling method for prediction of the development cost of general aviation aircraft. The proposed technique depends on some principal components, acquired by utilizing P value analysis and gray correlation analysis. According to these principal components, the corresponding linear regression and BP neural network models are established respectively. The feasibility and accuracy of the P value analysis are verified by comparing results of model fitting and prediction. A sensitivity analysis related to model precision and suitability is discussed in detail. Results obtained in this study show that the proposed method not only has a certain degree of versatility, but also provides a preliminary prediction of the development cost of general aviation aircraft.
基金supported by the National Natural Science Foundation of China,No.81350013(to XYY)。
文摘After spinal cord injury, dysregulated miRNAs appear and can participate in inflammatory responses, as well as the inhibition of apoptosis and axon regeneration through multiple pathways. However, the functions of miRNAs in spinal cord ischemia-reperfusion injury progression remain unclear. miRCURY LNATM Arrays were used to analyze miRNA expression profiles of rats after 90 minutes of ischemia followed by reperfusion for 24 and 48 hours. Furthermore, subsequent construction of aberrantly expressed miRNA regulatory patterns involved cell survival, proliferation, and apoptosis. Remarkably, the mitogen-activated protein kinase(MAPK) signaling pathway was the most significantly enriched pathway among 24-and 48-hour groups. Bioinformatics analysis and quantitative reverse transcription polymerase chain reaction confirmed the persistent overexpression of miR-22-3 p in both groups. These results suggest that the aberrant miRNA regulatory network is possibly regulated MAPK signaling and continuously affects the physiological and biochemical status of cells, thus participating in the regulation of spinal cord ischemia-reperfusion injury. As such, miR-22-3 p may play sustained regulatory roles in spinal cord ischemia-reperfusion injury. All experimental procedures were approved by the Animal Ethics Committee of Jilin University, China [approval No. 2020(Research) 01].